May 8 00:52:11.066538 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 7 23:10:51 -00 2025 May 8 00:52:11.066564 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:52:11.066576 kernel: BIOS-provided physical RAM map: May 8 00:52:11.066583 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:52:11.066589 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:52:11.066595 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:52:11.066603 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:52:11.066610 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:52:11.066616 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:52:11.066625 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:52:11.066631 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 8 00:52:11.066638 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:52:11.066644 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:52:11.066651 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:52:11.066659 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:52:11.066668 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:52:11.066675 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:52:11.066682 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:52:11.066689 kernel: NX (Execute Disable) protection: active May 8 00:52:11.066696 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:52:11.066703 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:52:11.066720 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:52:11.066727 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:52:11.066743 kernel: extended physical RAM map: May 8 00:52:11.066750 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:52:11.066760 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:52:11.066767 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:52:11.066774 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:52:11.066781 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:52:11.066788 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:52:11.066798 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:52:11.066805 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 8 00:52:11.066812 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 8 00:52:11.066819 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 8 00:52:11.066825 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 8 00:52:11.066832 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 8 00:52:11.066841 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:52:11.066848 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:52:11.066855 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:52:11.066862 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:52:11.066872 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:52:11.066880 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:52:11.066887 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:52:11.066896 kernel: efi: EFI v2.70 by EDK II May 8 00:52:11.066903 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 8 00:52:11.066911 kernel: random: crng init done May 8 00:52:11.066918 kernel: SMBIOS 2.8 present. May 8 00:52:11.066926 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 8 00:52:11.066933 kernel: Hypervisor detected: KVM May 8 00:52:11.066941 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 8 00:52:11.066948 kernel: kvm-clock: cpu 0, msr 16198001, primary cpu clock May 8 00:52:11.066956 kernel: kvm-clock: using sched offset of 6391177321 cycles May 8 00:52:11.066968 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 8 00:52:11.066976 kernel: tsc: Detected 2794.748 MHz processor May 8 00:52:11.066984 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 8 00:52:11.066992 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 8 00:52:11.066999 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 8 00:52:11.067007 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 8 00:52:11.067015 kernel: Using GB pages for direct mapping May 8 00:52:11.067022 kernel: Secure boot disabled May 8 00:52:11.067030 kernel: ACPI: Early table checksum verification disabled May 8 00:52:11.067039 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 8 00:52:11.067047 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 8 00:52:11.067055 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067062 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067070 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 8 00:52:11.067078 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067085 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067093 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067101 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:11.067110 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 8 00:52:11.067117 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 8 00:52:11.067125 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 8 00:52:11.067133 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 8 00:52:11.067140 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 8 00:52:11.067148 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 8 00:52:11.067158 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 8 00:52:11.067166 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 8 00:52:11.067173 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 8 00:52:11.067182 kernel: No NUMA configuration found May 8 00:52:11.067190 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 8 00:52:11.067197 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 8 00:52:11.067205 kernel: Zone ranges: May 8 00:52:11.067213 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 8 00:52:11.067220 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 8 00:52:11.067228 kernel: Normal empty May 8 00:52:11.067235 kernel: Movable zone start for each node May 8 00:52:11.067243 kernel: Early memory node ranges May 8 00:52:11.067252 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 8 00:52:11.067259 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 8 00:52:11.067267 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 8 00:52:11.067274 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 8 00:52:11.067282 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 8 00:52:11.067289 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 8 00:52:11.067297 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 8 00:52:11.067304 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:52:11.067312 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 8 00:52:11.067320 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 8 00:52:11.067329 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:52:11.067337 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 8 00:52:11.067344 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 8 00:52:11.067352 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 8 00:52:11.067360 kernel: ACPI: PM-Timer IO Port: 0x608 May 8 00:52:11.067367 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 8 00:52:11.067375 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 8 00:52:11.067382 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 8 00:52:11.067390 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 8 00:52:11.067399 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 8 00:52:11.067407 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 8 00:52:11.067415 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 8 00:52:11.067425 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 8 00:52:11.067433 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 8 00:52:11.067440 kernel: TSC deadline timer available May 8 00:52:11.067448 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 8 00:52:11.067467 kernel: kvm-guest: KVM setup pv remote TLB flush May 8 00:52:11.067475 kernel: kvm-guest: setup PV sched yield May 8 00:52:11.067484 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 8 00:52:11.067492 kernel: Booting paravirtualized kernel on KVM May 8 00:52:11.067505 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 8 00:52:11.067515 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 8 00:52:11.067523 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 8 00:52:11.067531 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 8 00:52:11.067539 kernel: pcpu-alloc: [0] 0 1 2 3 May 8 00:52:11.067550 kernel: kvm-guest: setup async PF for cpu 0 May 8 00:52:11.067558 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 8 00:52:11.067566 kernel: kvm-guest: PV spinlocks enabled May 8 00:52:11.067574 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 8 00:52:11.067582 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 8 00:52:11.067592 kernel: Policy zone: DMA32 May 8 00:52:11.067601 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:52:11.067609 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:52:11.067617 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:52:11.067627 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:52:11.067635 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:52:11.067643 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2279K rwdata, 13724K rodata, 47464K init, 4116K bss, 169308K reserved, 0K cma-reserved) May 8 00:52:11.067651 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:52:11.067659 kernel: ftrace: allocating 34584 entries in 136 pages May 8 00:52:11.067667 kernel: ftrace: allocated 136 pages with 2 groups May 8 00:52:11.067675 kernel: rcu: Hierarchical RCU implementation. May 8 00:52:11.067684 kernel: rcu: RCU event tracing is enabled. May 8 00:52:11.067692 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:52:11.067702 kernel: Rude variant of Tasks RCU enabled. May 8 00:52:11.067710 kernel: Tracing variant of Tasks RCU enabled. May 8 00:52:11.067718 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:52:11.067726 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:52:11.067742 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 8 00:52:11.067750 kernel: Console: colour dummy device 80x25 May 8 00:52:11.067758 kernel: printk: console [ttyS0] enabled May 8 00:52:11.067766 kernel: ACPI: Core revision 20210730 May 8 00:52:11.067774 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 8 00:52:11.067784 kernel: APIC: Switch to symmetric I/O mode setup May 8 00:52:11.067791 kernel: x2apic enabled May 8 00:52:11.067799 kernel: Switched APIC routing to physical x2apic. May 8 00:52:11.067807 kernel: kvm-guest: setup PV IPIs May 8 00:52:11.067816 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 8 00:52:11.067824 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 8 00:52:11.067832 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 8 00:52:11.067840 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 8 00:52:11.067848 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 8 00:52:11.067857 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 8 00:52:11.067866 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 8 00:52:11.067873 kernel: Spectre V2 : Mitigation: Retpolines May 8 00:52:11.067882 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch May 8 00:52:11.067890 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT May 8 00:52:11.067898 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 8 00:52:11.067906 kernel: RETBleed: Mitigation: untrained return thunk May 8 00:52:11.067917 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 8 00:52:11.067925 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 8 00:52:11.067934 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 8 00:52:11.067945 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 8 00:52:11.067953 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 8 00:52:11.067961 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 8 00:52:11.067969 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 8 00:52:11.067977 kernel: Freeing SMP alternatives memory: 32K May 8 00:52:11.067985 kernel: pid_max: default: 32768 minimum: 301 May 8 00:52:11.067993 kernel: LSM: Security Framework initializing May 8 00:52:11.068002 kernel: SELinux: Initializing. May 8 00:52:11.068011 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:11.068019 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:11.068027 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 8 00:52:11.068035 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 8 00:52:11.068043 kernel: ... version: 0 May 8 00:52:11.068051 kernel: ... bit width: 48 May 8 00:52:11.068059 kernel: ... generic registers: 6 May 8 00:52:11.068067 kernel: ... value mask: 0000ffffffffffff May 8 00:52:11.068076 kernel: ... max period: 00007fffffffffff May 8 00:52:11.068084 kernel: ... fixed-purpose events: 0 May 8 00:52:11.068092 kernel: ... event mask: 000000000000003f May 8 00:52:11.068100 kernel: signal: max sigframe size: 1776 May 8 00:52:11.068108 kernel: rcu: Hierarchical SRCU implementation. May 8 00:52:11.068115 kernel: smp: Bringing up secondary CPUs ... May 8 00:52:11.068123 kernel: x86: Booting SMP configuration: May 8 00:52:11.068131 kernel: .... node #0, CPUs: #1 May 8 00:52:11.068139 kernel: kvm-clock: cpu 1, msr 16198041, secondary cpu clock May 8 00:52:11.068147 kernel: kvm-guest: setup async PF for cpu 1 May 8 00:52:11.068157 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 8 00:52:11.068164 kernel: #2 May 8 00:52:11.068173 kernel: kvm-clock: cpu 2, msr 16198081, secondary cpu clock May 8 00:52:11.068181 kernel: kvm-guest: setup async PF for cpu 2 May 8 00:52:11.068188 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 8 00:52:11.068196 kernel: #3 May 8 00:52:11.068204 kernel: kvm-clock: cpu 3, msr 161980c1, secondary cpu clock May 8 00:52:11.068212 kernel: kvm-guest: setup async PF for cpu 3 May 8 00:52:11.068220 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 8 00:52:11.068230 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:52:11.068238 kernel: smpboot: Max logical packages: 1 May 8 00:52:11.068246 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 8 00:52:11.068254 kernel: devtmpfs: initialized May 8 00:52:11.068262 kernel: x86/mm: Memory block size: 128MB May 8 00:52:11.068270 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 8 00:52:11.068278 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 8 00:52:11.068286 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 8 00:52:11.068294 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 8 00:52:11.068304 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 8 00:52:11.068312 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:52:11.068320 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:52:11.068328 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:52:11.068336 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:52:11.068344 kernel: audit: initializing netlink subsys (disabled) May 8 00:52:11.068352 kernel: audit: type=2000 audit(1746665530.419:1): state=initialized audit_enabled=0 res=1 May 8 00:52:11.068360 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:52:11.068368 kernel: thermal_sys: Registered thermal governor 'user_space' May 8 00:52:11.068377 kernel: cpuidle: using governor menu May 8 00:52:11.068385 kernel: ACPI: bus type PCI registered May 8 00:52:11.068393 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:52:11.068401 kernel: dca service started, version 1.12.1 May 8 00:52:11.068409 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 8 00:52:11.068417 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 8 00:52:11.068425 kernel: PCI: Using configuration type 1 for base access May 8 00:52:11.068436 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 8 00:52:11.068444 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:52:11.068463 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:52:11.068471 kernel: ACPI: Added _OSI(Module Device) May 8 00:52:11.068479 kernel: ACPI: Added _OSI(Processor Device) May 8 00:52:11.068487 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:52:11.068495 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:52:11.068503 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:52:11.068511 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:52:11.068519 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:52:11.068527 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:52:11.068536 kernel: ACPI: Interpreter enabled May 8 00:52:11.068544 kernel: ACPI: PM: (supports S0 S3 S5) May 8 00:52:11.068552 kernel: ACPI: Using IOAPIC for interrupt routing May 8 00:52:11.068560 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 8 00:52:11.068568 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 8 00:52:11.068576 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:52:11.068747 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:52:11.068836 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 8 00:52:11.068921 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 8 00:52:11.068931 kernel: PCI host bridge to bus 0000:00 May 8 00:52:11.069027 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 8 00:52:11.069103 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 8 00:52:11.069191 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 8 00:52:11.069283 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 8 00:52:11.069369 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 8 00:52:11.069446 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 8 00:52:11.069535 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:52:11.069644 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 8 00:52:11.069747 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 8 00:52:11.069834 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 8 00:52:11.069917 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 8 00:52:11.070003 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 8 00:52:11.070085 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 8 00:52:11.070193 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 8 00:52:11.070300 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:52:11.070390 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 8 00:52:11.070489 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 8 00:52:11.070575 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 8 00:52:11.070692 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 8 00:52:11.070847 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 8 00:52:11.070932 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 8 00:52:11.071019 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 8 00:52:11.071120 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 8 00:52:11.071205 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 8 00:52:11.071289 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 8 00:52:11.071378 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 8 00:52:11.071478 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 8 00:52:11.071583 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 8 00:52:11.071667 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 8 00:52:11.071778 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 8 00:52:11.071864 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 8 00:52:11.071950 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 8 00:52:11.072051 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 8 00:52:11.072134 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 8 00:52:11.072145 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 8 00:52:11.072153 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 8 00:52:11.072161 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 8 00:52:11.072169 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 8 00:52:11.072177 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 8 00:52:11.072188 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 8 00:52:11.072196 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 8 00:52:11.072204 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 8 00:52:11.072212 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 8 00:52:11.072220 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 8 00:52:11.072228 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 8 00:52:11.072236 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 8 00:52:11.072244 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 8 00:52:11.072252 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 8 00:52:11.072261 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 8 00:52:11.072269 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 8 00:52:11.072277 kernel: iommu: Default domain type: Translated May 8 00:52:11.072285 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 8 00:52:11.072369 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 8 00:52:11.072464 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 8 00:52:11.072548 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 8 00:52:11.072559 kernel: vgaarb: loaded May 8 00:52:11.072567 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:52:11.072578 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:52:11.072586 kernel: PTP clock support registered May 8 00:52:11.072599 kernel: Registered efivars operations May 8 00:52:11.072608 kernel: PCI: Using ACPI for IRQ routing May 8 00:52:11.072616 kernel: PCI: pci_cache_line_size set to 64 bytes May 8 00:52:11.072624 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 8 00:52:11.072632 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 8 00:52:11.072640 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 8 00:52:11.072648 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 8 00:52:11.072658 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 8 00:52:11.072667 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 8 00:52:11.072674 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 8 00:52:11.072682 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 8 00:52:11.072690 kernel: clocksource: Switched to clocksource kvm-clock May 8 00:52:11.072698 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:52:11.072707 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:52:11.072715 kernel: pnp: PnP ACPI init May 8 00:52:11.072879 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 8 00:52:11.072896 kernel: pnp: PnP ACPI: found 6 devices May 8 00:52:11.072904 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 8 00:52:11.072912 kernel: NET: Registered PF_INET protocol family May 8 00:52:11.072920 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:52:11.072928 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:52:11.072937 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:52:11.072945 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:52:11.072953 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:52:11.072962 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:52:11.072971 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:11.072979 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:11.072987 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:52:11.072995 kernel: NET: Registered PF_XDP protocol family May 8 00:52:11.073094 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 8 00:52:11.073177 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 8 00:52:11.073249 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 8 00:52:11.073321 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 8 00:52:11.073390 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 8 00:52:11.073473 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 8 00:52:11.073547 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 8 00:52:11.073616 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 8 00:52:11.073626 kernel: PCI: CLS 0 bytes, default 64 May 8 00:52:11.073634 kernel: Initialise system trusted keyrings May 8 00:52:11.073641 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:52:11.073650 kernel: Key type asymmetric registered May 8 00:52:11.073657 kernel: Asymmetric key parser 'x509' registered May 8 00:52:11.073665 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:52:11.073682 kernel: io scheduler mq-deadline registered May 8 00:52:11.073691 kernel: io scheduler kyber registered May 8 00:52:11.073699 kernel: io scheduler bfq registered May 8 00:52:11.073707 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 8 00:52:11.073715 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 8 00:52:11.073722 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 8 00:52:11.073731 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 8 00:52:11.073747 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:52:11.073755 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 8 00:52:11.073762 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 8 00:52:11.073769 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 8 00:52:11.073777 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 8 00:52:11.073784 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 8 00:52:11.073886 kernel: rtc_cmos 00:04: RTC can wake from S4 May 8 00:52:11.073960 kernel: rtc_cmos 00:04: registered as rtc0 May 8 00:52:11.074035 kernel: rtc_cmos 00:04: setting system clock to 2025-05-08T00:52:10 UTC (1746665530) May 8 00:52:11.074107 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 8 00:52:11.074118 kernel: efifb: probing for efifb May 8 00:52:11.074126 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 8 00:52:11.074133 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 8 00:52:11.074141 kernel: efifb: scrolling: redraw May 8 00:52:11.074148 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 8 00:52:11.074155 kernel: Console: switching to colour frame buffer device 160x50 May 8 00:52:11.074165 kernel: fb0: EFI VGA frame buffer device May 8 00:52:11.074172 kernel: pstore: Registered efi as persistent store backend May 8 00:52:11.074179 kernel: NET: Registered PF_INET6 protocol family May 8 00:52:11.074187 kernel: Segment Routing with IPv6 May 8 00:52:11.074195 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:52:11.074203 kernel: NET: Registered PF_PACKET protocol family May 8 00:52:11.074211 kernel: Key type dns_resolver registered May 8 00:52:11.074219 kernel: IPI shorthand broadcast: enabled May 8 00:52:11.074227 kernel: sched_clock: Marking stable (596388400, 202205699)->(883648763, -85054664) May 8 00:52:11.074234 kernel: registered taskstats version 1 May 8 00:52:11.074242 kernel: Loading compiled-in X.509 certificates May 8 00:52:11.074249 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: c9ff13353458e6fa2786638fdd3dcad841d1075c' May 8 00:52:11.074257 kernel: Key type .fscrypt registered May 8 00:52:11.074264 kernel: Key type fscrypt-provisioning registered May 8 00:52:11.074271 kernel: pstore: Using crash dump compression: deflate May 8 00:52:11.074280 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:52:11.074287 kernel: ima: Allocated hash algorithm: sha1 May 8 00:52:11.074295 kernel: ima: No architecture policies found May 8 00:52:11.074302 kernel: clk: Disabling unused clocks May 8 00:52:11.074309 kernel: Freeing unused kernel image (initmem) memory: 47464K May 8 00:52:11.074317 kernel: Write protecting the kernel read-only data: 28672k May 8 00:52:11.074324 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 8 00:52:11.074331 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 8 00:52:11.074339 kernel: Run /init as init process May 8 00:52:11.074347 kernel: with arguments: May 8 00:52:11.074354 kernel: /init May 8 00:52:11.074361 kernel: with environment: May 8 00:52:11.074369 kernel: HOME=/ May 8 00:52:11.074376 kernel: TERM=linux May 8 00:52:11.074383 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:52:11.074393 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:11.074402 systemd[1]: Detected virtualization kvm. May 8 00:52:11.074411 systemd[1]: Detected architecture x86-64. May 8 00:52:11.074419 systemd[1]: Running in initrd. May 8 00:52:11.074427 systemd[1]: No hostname configured, using default hostname. May 8 00:52:11.074435 systemd[1]: Hostname set to . May 8 00:52:11.074443 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:11.074461 systemd[1]: Queued start job for default target initrd.target. May 8 00:52:11.074469 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:11.074476 systemd[1]: Reached target cryptsetup.target. May 8 00:52:11.074485 systemd[1]: Reached target paths.target. May 8 00:52:11.074493 systemd[1]: Reached target slices.target. May 8 00:52:11.074501 systemd[1]: Reached target swap.target. May 8 00:52:11.074508 systemd[1]: Reached target timers.target. May 8 00:52:11.074517 systemd[1]: Listening on iscsid.socket. May 8 00:52:11.074524 systemd[1]: Listening on iscsiuio.socket. May 8 00:52:11.074534 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:52:11.074542 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:52:11.074551 systemd[1]: Listening on systemd-journald.socket. May 8 00:52:11.074558 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:11.074566 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:11.074574 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:11.074582 systemd[1]: Reached target sockets.target. May 8 00:52:11.074590 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:11.074597 systemd[1]: Finished network-cleanup.service. May 8 00:52:11.074605 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:52:11.074614 systemd[1]: Starting systemd-journald.service... May 8 00:52:11.074622 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:11.074630 systemd[1]: Starting systemd-resolved.service... May 8 00:52:11.074638 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:52:11.074645 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:11.074653 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:52:11.074661 kernel: audit: type=1130 audit(1746665531.066:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.074669 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:52:11.074680 systemd-journald[199]: Journal started May 8 00:52:11.074721 systemd-journald[199]: Runtime Journal (/run/log/journal/57c2f9d4c571480d9128230271c0aae2) is 6.0M, max 48.4M, 42.4M free. May 8 00:52:11.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.070191 systemd-modules-load[200]: Inserted module 'overlay' May 8 00:52:11.090756 systemd[1]: Started systemd-journald.service. May 8 00:52:11.090838 kernel: audit: type=1130 audit(1746665531.085:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.091519 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:52:11.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.097423 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:52:11.102989 kernel: audit: type=1130 audit(1746665531.093:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.103027 kernel: audit: type=1130 audit(1746665531.098:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.102336 systemd-resolved[201]: Positive Trust Anchors: May 8 00:52:11.102346 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:11.102373 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:11.105350 systemd-resolved[201]: Defaulting to hostname 'linux'. May 8 00:52:11.113588 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:52:11.117474 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:52:11.118064 systemd[1]: Started systemd-resolved.service. May 8 00:52:11.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.120171 systemd[1]: Reached target nss-lookup.target. May 8 00:52:11.125712 kernel: audit: type=1130 audit(1746665531.118:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.125746 kernel: Bridge firewalling registered May 8 00:52:11.125145 systemd-modules-load[200]: Inserted module 'br_netfilter' May 8 00:52:11.130383 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:52:11.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.132993 systemd[1]: Starting dracut-cmdline.service... May 8 00:52:11.142872 kernel: audit: type=1130 audit(1746665531.132:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.142931 dracut-cmdline[216]: dracut-dracut-053 May 8 00:52:11.147343 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:52:11.153354 kernel: SCSI subsystem initialized May 8 00:52:11.159610 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:52:11.159639 kernel: device-mapper: uevent: version 1.0.3 May 8 00:52:11.161050 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:52:11.165053 systemd-modules-load[200]: Inserted module 'dm_multipath' May 8 00:52:11.167212 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:11.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.170279 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:11.174312 kernel: audit: type=1130 audit(1746665531.169:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.180126 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:11.185294 kernel: audit: type=1130 audit(1746665531.181:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.220491 kernel: Loading iSCSI transport class v2.0-870. May 8 00:52:11.237506 kernel: iscsi: registered transport (tcp) May 8 00:52:11.259485 kernel: iscsi: registered transport (qla4xxx) May 8 00:52:11.259530 kernel: QLogic iSCSI HBA Driver May 8 00:52:11.298482 systemd[1]: Finished dracut-cmdline.service. May 8 00:52:11.316905 kernel: audit: type=1130 audit(1746665531.298:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.300579 systemd[1]: Starting dracut-pre-udev.service... May 8 00:52:11.365504 kernel: raid6: avx2x4 gen() 24115 MB/s May 8 00:52:11.382503 kernel: raid6: avx2x4 xor() 5976 MB/s May 8 00:52:11.399493 kernel: raid6: avx2x2 gen() 29642 MB/s May 8 00:52:11.433483 kernel: raid6: avx2x2 xor() 18689 MB/s May 8 00:52:11.450481 kernel: raid6: avx2x1 gen() 25675 MB/s May 8 00:52:11.499484 kernel: raid6: avx2x1 xor() 15124 MB/s May 8 00:52:11.558481 kernel: raid6: sse2x4 gen() 14154 MB/s May 8 00:52:11.621497 kernel: raid6: sse2x4 xor() 6872 MB/s May 8 00:52:11.685500 kernel: raid6: sse2x2 gen() 16117 MB/s May 8 00:52:11.702497 kernel: raid6: sse2x2 xor() 9394 MB/s May 8 00:52:11.732500 kernel: raid6: sse2x1 gen() 11991 MB/s May 8 00:52:11.749942 kernel: raid6: sse2x1 xor() 7572 MB/s May 8 00:52:11.749979 kernel: raid6: using algorithm avx2x2 gen() 29642 MB/s May 8 00:52:11.749993 kernel: raid6: .... xor() 18689 MB/s, rmw enabled May 8 00:52:11.750692 kernel: raid6: using avx2x2 recovery algorithm May 8 00:52:11.779591 kernel: xor: automatically using best checksumming function avx May 8 00:52:11.880495 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 8 00:52:11.889977 systemd[1]: Finished dracut-pre-udev.service. May 8 00:52:11.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.895000 audit: BPF prog-id=7 op=LOAD May 8 00:52:11.895000 audit: BPF prog-id=8 op=LOAD May 8 00:52:11.896765 systemd[1]: Starting systemd-udevd.service... May 8 00:52:11.910091 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 8 00:52:11.914285 systemd[1]: Started systemd-udevd.service. May 8 00:52:11.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.916151 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:52:11.929078 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 8 00:52:11.955077 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:52:11.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:11.958064 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:11.995489 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:12.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:12.032480 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:52:12.043999 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:52:12.044016 kernel: GPT:9289727 != 19775487 May 8 00:52:12.044027 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:52:12.044038 kernel: GPT:9289727 != 19775487 May 8 00:52:12.044048 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:52:12.044067 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:12.044079 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:52:12.047474 kernel: libata version 3.00 loaded. May 8 00:52:12.054096 kernel: AVX2 version of gcm_enc/dec engaged. May 8 00:52:12.054119 kernel: AES CTR mode by8 optimization enabled May 8 00:52:12.056988 kernel: ahci 0000:00:1f.2: version 3.0 May 8 00:52:12.091047 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 8 00:52:12.091072 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 8 00:52:12.091195 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 8 00:52:12.091276 kernel: scsi host0: ahci May 8 00:52:12.091373 kernel: scsi host1: ahci May 8 00:52:12.091483 kernel: scsi host2: ahci May 8 00:52:12.091592 kernel: scsi host3: ahci May 8 00:52:12.091682 kernel: scsi host4: ahci May 8 00:52:12.091784 kernel: scsi host5: ahci May 8 00:52:12.091873 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 8 00:52:12.091883 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 8 00:52:12.091891 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 8 00:52:12.091904 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 8 00:52:12.091913 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 8 00:52:12.091921 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 8 00:52:12.101547 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:52:12.104327 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (491) May 8 00:52:12.110301 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:52:12.129404 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:52:12.129717 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:52:12.133581 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:12.135238 systemd[1]: Starting disk-uuid.service... May 8 00:52:12.295355 disk-uuid[534]: Primary Header is updated. May 8 00:52:12.295355 disk-uuid[534]: Secondary Entries is updated. May 8 00:52:12.295355 disk-uuid[534]: Secondary Header is updated. May 8 00:52:12.302296 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:12.305512 kernel: GPT:disk_guids don't match. May 8 00:52:12.305610 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:52:12.305620 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:12.310494 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:12.404306 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 8 00:52:12.404377 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 8 00:52:12.404392 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 8 00:52:12.406480 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 8 00:52:12.408522 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 8 00:52:12.408553 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 8 00:52:12.410047 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 8 00:52:12.410140 kernel: ata3.00: applying bridge limits May 8 00:52:12.411885 kernel: ata3.00: configured for UDMA/100 May 8 00:52:12.412491 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 8 00:52:12.445086 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 8 00:52:12.462839 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 8 00:52:12.462862 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 8 00:52:13.328477 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:13.328993 disk-uuid[535]: The operation has completed successfully. May 8 00:52:13.350199 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:52:13.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.350321 systemd[1]: Finished disk-uuid.service. May 8 00:52:13.386424 systemd[1]: Starting verity-setup.service... May 8 00:52:13.400504 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 8 00:52:13.426792 systemd[1]: Found device dev-mapper-usr.device. May 8 00:52:13.430639 systemd[1]: Mounting sysusr-usr.mount... May 8 00:52:13.452726 systemd[1]: Finished verity-setup.service. May 8 00:52:13.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.513497 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:52:13.514022 systemd[1]: Mounted sysusr-usr.mount. May 8 00:52:13.515016 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:52:13.515853 systemd[1]: Starting ignition-setup.service... May 8 00:52:13.518695 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:52:13.527544 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:52:13.527618 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:13.527631 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:13.537633 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:52:13.602201 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:52:13.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.615000 audit: BPF prog-id=9 op=LOAD May 8 00:52:13.616110 systemd[1]: Starting systemd-networkd.service... May 8 00:52:13.639399 systemd-networkd[710]: lo: Link UP May 8 00:52:13.639412 systemd-networkd[710]: lo: Gained carrier May 8 00:52:13.639948 systemd-networkd[710]: Enumeration completed May 8 00:52:13.640174 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:13.643045 systemd-networkd[710]: eth0: Link UP May 8 00:52:13.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.643049 systemd-networkd[710]: eth0: Gained carrier May 8 00:52:13.644075 systemd[1]: Started systemd-networkd.service. May 8 00:52:13.648287 systemd[1]: Reached target network.target. May 8 00:52:13.652675 systemd[1]: Starting iscsiuio.service... May 8 00:52:13.657815 systemd[1]: Started iscsiuio.service. May 8 00:52:13.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.660627 systemd[1]: Starting iscsid.service... May 8 00:52:13.662050 systemd-networkd[710]: eth0: DHCPv4 address 10.0.0.137/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:13.664809 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:13.664809 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 8 00:52:13.664809 iscsid[715]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:52:13.664809 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:52:13.664809 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:52:13.664809 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:13.664809 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:52:13.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.667035 systemd[1]: Started iscsid.service. May 8 00:52:13.672244 systemd[1]: Starting dracut-initqueue.service... May 8 00:52:13.684236 systemd[1]: Finished dracut-initqueue.service. May 8 00:52:13.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.696046 systemd[1]: Reached target remote-fs-pre.target. May 8 00:52:13.696795 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:13.697001 systemd[1]: Reached target remote-fs.target. May 8 00:52:13.698218 systemd[1]: Starting dracut-pre-mount.service... May 8 00:52:13.705587 systemd[1]: Finished dracut-pre-mount.service. May 8 00:52:13.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.735176 systemd[1]: Finished ignition-setup.service. May 8 00:52:13.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:13.740701 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:52:14.247257 ignition[730]: Ignition 2.14.0 May 8 00:52:14.247273 ignition[730]: Stage: fetch-offline May 8 00:52:14.247327 ignition[730]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:14.247349 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:14.247501 ignition[730]: parsed url from cmdline: "" May 8 00:52:14.247506 ignition[730]: no config URL provided May 8 00:52:14.247511 ignition[730]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:52:14.247519 ignition[730]: no config at "/usr/lib/ignition/user.ign" May 8 00:52:14.247539 ignition[730]: op(1): [started] loading QEMU firmware config module May 8 00:52:14.247545 ignition[730]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:52:14.254031 ignition[730]: op(1): [finished] loading QEMU firmware config module May 8 00:52:14.298269 ignition[730]: parsing config with SHA512: 452657af227dfe66abd235da31ac5c444f5460e0c7bfbb50dd295005c0b22aa6af170d43444ee1405153476743f41464fcb11a1d2c70ead542213120d6995e0e May 8 00:52:14.899489 unknown[730]: fetched base config from "system" May 8 00:52:14.899506 unknown[730]: fetched user config from "qemu" May 8 00:52:14.900096 ignition[730]: fetch-offline: fetch-offline passed May 8 00:52:14.902025 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:52:14.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.900170 ignition[730]: Ignition finished successfully May 8 00:52:14.904320 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:52:14.905903 systemd[1]: Starting ignition-kargs.service... May 8 00:52:14.919541 ignition[738]: Ignition 2.14.0 May 8 00:52:14.919551 ignition[738]: Stage: kargs May 8 00:52:14.919669 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:14.919680 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:14.922769 systemd[1]: Finished ignition-kargs.service. May 8 00:52:14.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.920653 ignition[738]: kargs: kargs passed May 8 00:52:14.920692 ignition[738]: Ignition finished successfully May 8 00:52:14.925771 systemd[1]: Starting ignition-disks.service... May 8 00:52:14.933620 ignition[744]: Ignition 2.14.0 May 8 00:52:14.933641 ignition[744]: Stage: disks May 8 00:52:14.933756 ignition[744]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:14.933769 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:14.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.936235 systemd[1]: Finished ignition-disks.service. May 8 00:52:14.934864 ignition[744]: disks: disks passed May 8 00:52:14.937997 systemd[1]: Reached target initrd-root-device.target. May 8 00:52:14.934907 ignition[744]: Ignition finished successfully May 8 00:52:14.939986 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:14.940915 systemd[1]: Reached target local-fs.target. May 8 00:52:14.941795 systemd[1]: Reached target sysinit.target. May 8 00:52:14.943532 systemd[1]: Reached target basic.target. May 8 00:52:14.947677 systemd[1]: Starting systemd-fsck-root.service... May 8 00:52:14.967840 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 8 00:52:14.974395 systemd[1]: Finished systemd-fsck-root.service. May 8 00:52:14.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:14.977592 systemd[1]: Mounting sysroot.mount... May 8 00:52:14.990213 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:52:14.990424 systemd[1]: Mounted sysroot.mount. May 8 00:52:14.991969 systemd[1]: Reached target initrd-root-fs.target. May 8 00:52:14.994757 systemd[1]: Mounting sysroot-usr.mount... May 8 00:52:14.996793 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:52:14.996843 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:52:14.998319 systemd[1]: Reached target ignition-diskful.target. May 8 00:52:15.003045 systemd[1]: Mounted sysroot-usr.mount. May 8 00:52:15.006319 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:52:15.009126 systemd[1]: Starting initrd-setup-root.service... May 8 00:52:15.015511 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (758) May 8 00:52:15.015923 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:52:15.020355 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:52:15.020379 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:15.020405 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:15.020419 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory May 8 00:52:15.025705 initrd-setup-root[797]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:52:15.027588 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:52:15.032492 initrd-setup-root[805]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:52:15.074055 systemd[1]: Finished initrd-setup-root.service. May 8 00:52:15.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.075785 systemd[1]: Starting ignition-mount.service... May 8 00:52:15.077733 systemd[1]: Starting sysroot-boot.service... May 8 00:52:15.083074 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 8 00:52:15.083211 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 8 00:52:15.100577 ignition[823]: INFO : Ignition 2.14.0 May 8 00:52:15.101896 ignition[823]: INFO : Stage: mount May 8 00:52:15.101896 ignition[823]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.101896 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.116314 ignition[823]: INFO : mount: mount passed May 8 00:52:15.117400 ignition[823]: INFO : Ignition finished successfully May 8 00:52:15.118251 systemd[1]: Finished ignition-mount.service. May 8 00:52:15.124115 kernel: kauditd_printk_skb: 22 callbacks suppressed May 8 00:52:15.124153 kernel: audit: type=1130 audit(1746665535.119:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.124525 systemd[1]: Starting ignition-files.service... May 8 00:52:15.127842 systemd[1]: Finished sysroot-boot.service. May 8 00:52:15.132725 kernel: audit: type=1130 audit(1746665535.127:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:15.141172 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:52:15.153523 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (833) May 8 00:52:15.156031 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:52:15.156122 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:15.156137 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:15.162161 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:52:15.174319 ignition[852]: INFO : Ignition 2.14.0 May 8 00:52:15.174319 ignition[852]: INFO : Stage: files May 8 00:52:15.176572 ignition[852]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:15.176572 ignition[852]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:15.180582 ignition[852]: DEBUG : files: compiled without relabeling support, skipping May 8 00:52:15.180582 ignition[852]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:52:15.180582 ignition[852]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:52:15.187662 ignition[852]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:52:15.187662 ignition[852]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:52:15.187662 ignition[852]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:52:15.187662 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 8 00:52:15.187662 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 8 00:52:15.183758 unknown[852]: wrote ssh authorized keys file for user: core May 8 00:52:15.250382 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:52:15.280659 systemd-networkd[710]: eth0: Gained IPv6LL May 8 00:52:15.408224 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 8 00:52:15.408224 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 8 00:52:15.413078 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 8 00:52:15.801467 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:52:16.392863 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 8 00:52:16.392863 ignition[852]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:52:16.398186 ignition[852]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:16.454693 ignition[852]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:16.462776 ignition[852]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:52:16.462776 ignition[852]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:16.462776 ignition[852]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:16.462776 ignition[852]: INFO : files: files passed May 8 00:52:16.462776 ignition[852]: INFO : Ignition finished successfully May 8 00:52:16.471249 systemd[1]: Finished ignition-files.service. May 8 00:52:16.499656 kernel: audit: type=1130 audit(1746665536.471:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.472981 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:52:16.499712 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:52:16.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.505236 initrd-setup-root-after-ignition[875]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:52:16.511332 kernel: audit: type=1130 audit(1746665536.504:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.500862 systemd[1]: Starting ignition-quench.service... May 8 00:52:16.519162 kernel: audit: type=1130 audit(1746665536.510:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.519180 kernel: audit: type=1131 audit(1746665536.510:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.519329 initrd-setup-root-after-ignition[877]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:52:16.502041 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:52:16.505393 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:52:16.505487 systemd[1]: Finished ignition-quench.service. May 8 00:52:16.511543 systemd[1]: Reached target ignition-complete.target. May 8 00:52:16.520143 systemd[1]: Starting initrd-parse-etc.service... May 8 00:52:16.535963 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:52:16.536105 systemd[1]: Finished initrd-parse-etc.service. May 8 00:52:16.546169 kernel: audit: type=1130 audit(1746665536.537:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.547089 kernel: audit: type=1131 audit(1746665536.537:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.538111 systemd[1]: Reached target initrd-fs.target. May 8 00:52:16.546164 systemd[1]: Reached target initrd.target. May 8 00:52:16.547194 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:52:16.548564 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:52:16.563276 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:52:16.569068 kernel: audit: type=1130 audit(1746665536.563:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.565561 systemd[1]: Starting initrd-cleanup.service... May 8 00:52:16.577762 systemd[1]: Stopped target nss-lookup.target. May 8 00:52:16.606226 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:52:16.608008 systemd[1]: Stopped target timers.target. May 8 00:52:16.610036 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:52:16.640371 kernel: audit: type=1131 audit(1746665536.634:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.610216 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:52:16.635513 systemd[1]: Stopped target initrd.target. May 8 00:52:16.640611 systemd[1]: Stopped target basic.target. May 8 00:52:16.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.682860 iscsid[715]: iscsid shutting down. May 8 00:52:16.642513 systemd[1]: Stopped target ignition-complete.target. May 8 00:52:16.686068 ignition[892]: INFO : Ignition 2.14.0 May 8 00:52:16.686068 ignition[892]: INFO : Stage: umount May 8 00:52:16.686068 ignition[892]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:16.686068 ignition[892]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:16.686068 ignition[892]: INFO : umount: umount passed May 8 00:52:16.686068 ignition[892]: INFO : Ignition finished successfully May 8 00:52:16.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.644462 systemd[1]: Stopped target ignition-diskful.target. May 8 00:52:16.695000 audit: BPF prog-id=6 op=UNLOAD May 8 00:52:16.645028 systemd[1]: Stopped target initrd-root-device.target. May 8 00:52:16.645242 systemd[1]: Stopped target remote-fs.target. May 8 00:52:16.645466 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:52:16.645918 systemd[1]: Stopped target sysinit.target. May 8 00:52:16.646091 systemd[1]: Stopped target local-fs.target. May 8 00:52:16.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.646314 systemd[1]: Stopped target local-fs-pre.target. May 8 00:52:16.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.646506 systemd[1]: Stopped target swap.target. May 8 00:52:16.646708 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:52:16.646842 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:52:16.647035 systemd[1]: Stopped target cryptsetup.target. May 8 00:52:16.647339 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:52:16.647425 systemd[1]: Stopped dracut-initqueue.service. May 8 00:52:16.647839 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:52:16.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.647929 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:52:16.648257 systemd[1]: Stopped target paths.target. May 8 00:52:16.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.648332 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:52:16.649550 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:52:16.649931 systemd[1]: Stopped target slices.target. May 8 00:52:16.650119 systemd[1]: Stopped target sockets.target. May 8 00:52:16.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.650348 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:52:16.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.650491 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:52:16.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.650726 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:52:16.650844 systemd[1]: Stopped ignition-files.service. May 8 00:52:16.652359 systemd[1]: Stopping ignition-mount.service... May 8 00:52:16.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.652869 systemd[1]: Stopping iscsid.service... May 8 00:52:16.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.653802 systemd[1]: Stopping sysroot-boot.service... May 8 00:52:16.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.654216 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:52:16.654382 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:52:16.654911 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:52:16.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.655027 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:52:16.658578 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:52:16.658717 systemd[1]: Finished initrd-cleanup.service. May 8 00:52:16.660936 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:52:16.661052 systemd[1]: Stopped iscsid.service. May 8 00:52:16.661529 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:52:16.661563 systemd[1]: Closed iscsid.socket. May 8 00:52:16.665554 systemd[1]: Stopping iscsiuio.service... May 8 00:52:16.671425 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:52:16.671601 systemd[1]: Stopped iscsiuio.service. May 8 00:52:16.672307 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:52:16.672405 systemd[1]: Stopped ignition-mount.service. May 8 00:52:16.672864 systemd[1]: Stopped target network.target. May 8 00:52:16.672960 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:52:16.673001 systemd[1]: Closed iscsiuio.socket. May 8 00:52:16.673409 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:52:16.673468 systemd[1]: Stopped ignition-disks.service. May 8 00:52:16.673650 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:52:16.673689 systemd[1]: Stopped ignition-kargs.service. May 8 00:52:16.673855 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:52:16.673902 systemd[1]: Stopped ignition-setup.service. May 8 00:52:16.674318 systemd[1]: Stopping systemd-networkd.service... May 8 00:52:16.675029 systemd[1]: Stopping systemd-resolved.service... May 8 00:52:16.680280 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:52:16.686309 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:52:16.686460 systemd[1]: Stopped systemd-resolved.service. May 8 00:52:16.690729 systemd-networkd[710]: eth0: DHCPv6 lease lost May 8 00:52:16.845000 audit: BPF prog-id=9 op=UNLOAD May 8 00:52:16.693095 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:52:16.693205 systemd[1]: Stopped systemd-networkd.service. May 8 00:52:16.696312 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:52:16.696373 systemd[1]: Closed systemd-networkd.socket. May 8 00:52:16.714221 systemd[1]: Stopping network-cleanup.service... May 8 00:52:16.715628 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:52:16.715750 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:52:16.717497 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:52:16.717555 systemd[1]: Stopped systemd-sysctl.service. May 8 00:52:16.719404 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:52:16.719477 systemd[1]: Stopped systemd-modules-load.service. May 8 00:52:16.720678 systemd[1]: Stopping systemd-udevd.service... May 8 00:52:16.750860 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:52:16.755271 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:52:16.755403 systemd[1]: Stopped network-cleanup.service. May 8 00:52:16.758165 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:52:16.758336 systemd[1]: Stopped systemd-udevd.service. May 8 00:52:16.760966 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:52:16.761015 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:52:16.762921 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:52:16.762960 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:52:16.764812 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:52:16.764865 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:52:16.766750 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:52:16.766799 systemd[1]: Stopped dracut-cmdline.service. May 8 00:52:16.768440 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:52:16.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.768508 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:52:16.787724 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:52:16.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:16.789410 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 8 00:52:16.789489 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 8 00:52:16.791992 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:52:16.792046 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:52:16.793034 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:52:16.793116 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:52:16.795952 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 8 00:52:16.796695 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:52:16.796803 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:52:16.870057 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:52:16.870174 systemd[1]: Stopped sysroot-boot.service. May 8 00:52:16.872074 systemd[1]: Reached target initrd-switch-root.target. May 8 00:52:16.874176 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:52:16.874232 systemd[1]: Stopped initrd-setup-root.service. May 8 00:52:16.926500 systemd-journald[199]: Received SIGTERM from PID 1 (n/a). May 8 00:52:16.877228 systemd[1]: Starting initrd-switch-root.service... May 8 00:52:16.894945 systemd[1]: Switching root. May 8 00:52:16.928071 systemd-journald[199]: Journal stopped May 8 00:52:22.920831 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:52:22.920894 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:52:22.920906 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:52:22.920936 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:52:22.920946 kernel: SELinux: policy capability open_perms=1 May 8 00:52:22.920955 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:52:22.920969 kernel: SELinux: policy capability always_check_network=0 May 8 00:52:22.920979 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:52:22.920988 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:52:22.920998 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:52:22.921007 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:52:22.921018 systemd[1]: Successfully loaded SELinux policy in 76.648ms. May 8 00:52:22.921051 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.417ms. May 8 00:52:22.921063 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:22.921074 systemd[1]: Detected virtualization kvm. May 8 00:52:22.921091 systemd[1]: Detected architecture x86-64. May 8 00:52:22.921102 systemd[1]: Detected first boot. May 8 00:52:22.921118 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:22.921129 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:52:22.921140 systemd[1]: Populated /etc with preset unit settings. May 8 00:52:22.921151 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:22.921163 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:22.921174 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:22.921185 kernel: kauditd_printk_skb: 50 callbacks suppressed May 8 00:52:22.921201 kernel: audit: type=1334 audit(1746665542.547:86): prog-id=12 op=LOAD May 8 00:52:22.921211 kernel: audit: type=1334 audit(1746665542.547:87): prog-id=3 op=UNLOAD May 8 00:52:22.921221 kernel: audit: type=1334 audit(1746665542.549:88): prog-id=13 op=LOAD May 8 00:52:22.921230 kernel: audit: type=1334 audit(1746665542.551:89): prog-id=14 op=LOAD May 8 00:52:22.921240 kernel: audit: type=1334 audit(1746665542.551:90): prog-id=4 op=UNLOAD May 8 00:52:22.921249 kernel: audit: type=1334 audit(1746665542.551:91): prog-id=5 op=UNLOAD May 8 00:52:22.921258 kernel: audit: type=1334 audit(1746665542.555:92): prog-id=15 op=LOAD May 8 00:52:22.921268 kernel: audit: type=1334 audit(1746665542.555:93): prog-id=12 op=UNLOAD May 8 00:52:22.921284 kernel: audit: type=1334 audit(1746665542.558:94): prog-id=16 op=LOAD May 8 00:52:22.921293 kernel: audit: type=1334 audit(1746665542.559:95): prog-id=17 op=LOAD May 8 00:52:22.921303 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:52:22.921313 systemd[1]: Stopped initrd-switch-root.service. May 8 00:52:22.921324 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:52:22.921339 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:52:22.921350 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:52:22.921360 systemd[1]: Created slice system-getty.slice. May 8 00:52:22.921370 systemd[1]: Created slice system-modprobe.slice. May 8 00:52:22.921387 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:52:22.921398 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:52:22.921408 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:52:22.921426 systemd[1]: Created slice user.slice. May 8 00:52:22.921438 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:22.921448 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:52:22.921470 systemd[1]: Set up automount boot.automount. May 8 00:52:22.921481 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:52:22.921505 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:52:22.921515 systemd[1]: Stopped target initrd-fs.target. May 8 00:52:22.921525 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:52:22.921535 systemd[1]: Reached target integritysetup.target. May 8 00:52:22.921546 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:22.921556 systemd[1]: Reached target remote-fs.target. May 8 00:52:22.921570 systemd[1]: Reached target slices.target. May 8 00:52:22.921581 systemd[1]: Reached target swap.target. May 8 00:52:22.921591 systemd[1]: Reached target torcx.target. May 8 00:52:22.921612 systemd[1]: Reached target veritysetup.target. May 8 00:52:22.921623 systemd[1]: Listening on systemd-coredump.socket. May 8 00:52:22.921633 systemd[1]: Listening on systemd-initctl.socket. May 8 00:52:22.921644 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:22.921654 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:22.921664 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:22.921675 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:52:22.921685 systemd[1]: Mounting dev-hugepages.mount... May 8 00:52:22.921696 systemd[1]: Mounting dev-mqueue.mount... May 8 00:52:22.921706 systemd[1]: Mounting media.mount... May 8 00:52:22.921723 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:22.921734 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:52:22.921745 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:52:22.921755 systemd[1]: Mounting tmp.mount... May 8 00:52:22.921765 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:52:22.921775 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:22.921785 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:22.921796 systemd[1]: Starting modprobe@configfs.service... May 8 00:52:22.921807 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:22.921826 systemd[1]: Starting modprobe@drm.service... May 8 00:52:22.921836 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:22.921846 systemd[1]: Starting modprobe@fuse.service... May 8 00:52:22.921857 systemd[1]: Starting modprobe@loop.service... May 8 00:52:22.921867 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:52:22.921878 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:52:22.921888 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:52:22.921900 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:52:22.921918 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:52:22.921928 kernel: fuse: init (API version 7.34) May 8 00:52:22.921939 systemd[1]: Stopped systemd-journald.service. May 8 00:52:22.921968 kernel: loop: module loaded May 8 00:52:22.921984 systemd[1]: Starting systemd-journald.service... May 8 00:52:22.922001 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:22.922012 systemd[1]: Starting systemd-network-generator.service... May 8 00:52:22.922023 systemd[1]: Starting systemd-remount-fs.service... May 8 00:52:22.922033 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:22.922044 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:52:22.922054 systemd[1]: Stopped verity-setup.service. May 8 00:52:22.922065 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:22.922080 systemd-journald[1006]: Journal started May 8 00:52:22.922130 systemd-journald[1006]: Runtime Journal (/run/log/journal/57c2f9d4c571480d9128230271c0aae2) is 6.0M, max 48.4M, 42.4M free. May 8 00:52:17.028000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:52:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:18.633000 audit: BPF prog-id=10 op=LOAD May 8 00:52:18.633000 audit: BPF prog-id=10 op=UNLOAD May 8 00:52:18.633000 audit: BPF prog-id=11 op=LOAD May 8 00:52:18.633000 audit: BPF prog-id=11 op=UNLOAD May 8 00:52:18.665000 audit[925]: AVC avc: denied { associate } for pid=925 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:52:18.665000 audit[925]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a4 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=908 pid=925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:18.665000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:18.756000 audit[925]: AVC avc: denied { associate } for pid=925 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:52:18.756000 audit[925]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=908 pid=925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:18.756000 audit: CWD cwd="/" May 8 00:52:18.756000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:18.756000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:18.756000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:22.547000 audit: BPF prog-id=12 op=LOAD May 8 00:52:22.547000 audit: BPF prog-id=3 op=UNLOAD May 8 00:52:22.549000 audit: BPF prog-id=13 op=LOAD May 8 00:52:22.551000 audit: BPF prog-id=14 op=LOAD May 8 00:52:22.551000 audit: BPF prog-id=4 op=UNLOAD May 8 00:52:22.551000 audit: BPF prog-id=5 op=UNLOAD May 8 00:52:22.555000 audit: BPF prog-id=15 op=LOAD May 8 00:52:22.555000 audit: BPF prog-id=12 op=UNLOAD May 8 00:52:22.558000 audit: BPF prog-id=16 op=LOAD May 8 00:52:22.559000 audit: BPF prog-id=17 op=LOAD May 8 00:52:22.559000 audit: BPF prog-id=13 op=UNLOAD May 8 00:52:22.559000 audit: BPF prog-id=14 op=UNLOAD May 8 00:52:22.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.577000 audit: BPF prog-id=15 op=UNLOAD May 8 00:52:22.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.896000 audit: BPF prog-id=18 op=LOAD May 8 00:52:22.896000 audit: BPF prog-id=19 op=LOAD May 8 00:52:22.897000 audit: BPF prog-id=20 op=LOAD May 8 00:52:22.897000 audit: BPF prog-id=16 op=UNLOAD May 8 00:52:22.897000 audit: BPF prog-id=17 op=UNLOAD May 8 00:52:22.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.919000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:52:22.919000 audit[1006]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd48a4ddf0 a2=4000 a3=7ffd48a4de8c items=0 ppid=1 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.919000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:52:22.546002 systemd[1]: Queued start job for default target multi-user.target. May 8 00:52:18.663761 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:22.546014 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:52:18.664112 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:22.560727 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:52:18.664148 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:18.664189 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:52:18.664202 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:52:18.664249 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:52:18.664268 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:52:18.664561 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:52:22.924684 systemd[1]: Started systemd-journald.service. May 8 00:52:18.664617 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:22.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:18.664635 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:18.665329 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:52:18.665373 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:52:18.665396 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:52:22.925281 systemd[1]: Mounted dev-hugepages.mount. May 8 00:52:18.665415 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:52:18.665437 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:52:18.665469 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:52:22.160284 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:22.160608 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:22.160733 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:22.160940 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:22.161047 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:52:22.161143 /usr/lib/systemd/system-generators/torcx-generator[925]: time="2025-05-08T00:52:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:52:22.926492 systemd[1]: Mounted dev-mqueue.mount. May 8 00:52:22.927391 systemd[1]: Mounted media.mount. May 8 00:52:22.928300 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:52:22.929346 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:52:22.930408 systemd[1]: Mounted tmp.mount. May 8 00:52:22.931667 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:22.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.932963 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:52:22.933210 systemd[1]: Finished modprobe@configfs.service. May 8 00:52:22.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.934610 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:52:22.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.935812 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:22.935980 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:22.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.937165 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:22.937364 systemd[1]: Finished modprobe@drm.service. May 8 00:52:22.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.938561 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:22.938785 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:22.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.940034 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:52:22.940256 systemd[1]: Finished modprobe@fuse.service. May 8 00:52:22.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.941467 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:22.941666 systemd[1]: Finished modprobe@loop.service. May 8 00:52:22.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.942954 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:22.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.944240 systemd[1]: Finished systemd-network-generator.service. May 8 00:52:22.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.945652 systemd[1]: Finished systemd-remount-fs.service. May 8 00:52:22.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.974461 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:22.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.976072 systemd[1]: Reached target network-pre.target. May 8 00:52:22.978236 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:52:22.980134 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:52:22.980921 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:52:22.982354 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:52:22.984399 systemd[1]: Starting systemd-journal-flush.service... May 8 00:52:22.985441 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:22.986405 systemd[1]: Starting systemd-random-seed.service... May 8 00:52:22.987385 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:22.989126 systemd-journald[1006]: Time spent on flushing to /var/log/journal/57c2f9d4c571480d9128230271c0aae2 is 16.428ms for 1188 entries. May 8 00:52:22.989126 systemd-journald[1006]: System Journal (/var/log/journal/57c2f9d4c571480d9128230271c0aae2) is 8.0M, max 195.6M, 187.6M free. May 8 00:52:24.028734 systemd-journald[1006]: Received client request to flush runtime journal. May 8 00:52:23.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:23.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:23.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:23.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:22.988625 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:22.992242 systemd[1]: Starting systemd-sysusers.service... May 8 00:52:22.994176 systemd[1]: Starting systemd-udev-settle.service... May 8 00:52:24.029882 udevadm[1028]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:52:22.997351 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:52:22.998509 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:52:23.626941 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:23.658643 systemd[1]: Finished systemd-sysusers.service. May 8 00:52:23.660938 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:52:23.742507 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:52:23.801250 systemd[1]: Finished systemd-random-seed.service. May 8 00:52:23.825199 systemd[1]: Reached target first-boot-complete.target. May 8 00:52:24.031206 systemd[1]: Finished systemd-journal-flush.service. May 8 00:52:24.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:24.609671 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:52:24.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:24.620000 audit: BPF prog-id=21 op=LOAD May 8 00:52:24.621000 audit: BPF prog-id=22 op=LOAD May 8 00:52:24.621000 audit: BPF prog-id=7 op=UNLOAD May 8 00:52:24.621000 audit: BPF prog-id=8 op=UNLOAD May 8 00:52:24.622284 systemd[1]: Starting systemd-udevd.service... May 8 00:52:24.641848 systemd-udevd[1033]: Using default interface naming scheme 'v252'. May 8 00:52:24.657545 systemd[1]: Started systemd-udevd.service. May 8 00:52:24.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:24.660000 audit: BPF prog-id=23 op=LOAD May 8 00:52:24.661560 systemd[1]: Starting systemd-networkd.service... May 8 00:52:24.687000 audit: BPF prog-id=24 op=LOAD May 8 00:52:24.687000 audit: BPF prog-id=25 op=LOAD May 8 00:52:24.687000 audit: BPF prog-id=26 op=LOAD May 8 00:52:24.688985 systemd[1]: Starting systemd-userdbd.service... May 8 00:52:24.699810 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 8 00:52:24.713714 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:24.721949 systemd[1]: Started systemd-userdbd.service. May 8 00:52:24.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:24.763512 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 8 00:52:24.767479 kernel: ACPI: button: Power Button [PWRF] May 8 00:52:24.790637 systemd-networkd[1043]: lo: Link UP May 8 00:52:24.790983 systemd-networkd[1043]: lo: Gained carrier May 8 00:52:24.791653 systemd-networkd[1043]: Enumeration completed May 8 00:52:24.791833 systemd[1]: Started systemd-networkd.service. May 8 00:52:24.792853 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:24.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:24.814810 systemd-networkd[1043]: eth0: Link UP May 8 00:52:24.814825 systemd-networkd[1043]: eth0: Gained carrier May 8 00:52:24.786000 audit[1041]: AVC avc: denied { confidentiality } for pid=1041 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 8 00:52:24.786000 audit[1041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a20098fdf0 a1=338ac a2=7f8f9954ebc5 a3=5 items=110 ppid=1033 pid=1041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:24.786000 audit: CWD cwd="/" May 8 00:52:24.786000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=1 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=2 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=3 name=(null) inode=16453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=4 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=5 name=(null) inode=16454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=6 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=7 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=8 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=9 name=(null) inode=16456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=10 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=11 name=(null) inode=16457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=12 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=13 name=(null) inode=16458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=14 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=15 name=(null) inode=16459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=16 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=17 name=(null) inode=16460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=18 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=19 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=20 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=21 name=(null) inode=16462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=22 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=23 name=(null) inode=16463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=24 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=25 name=(null) inode=16464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=26 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=27 name=(null) inode=16465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=28 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=29 name=(null) inode=16466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.837677 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.137/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:24.786000 audit: PATH item=30 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=31 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=32 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=33 name=(null) inode=16468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=34 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=35 name=(null) inode=16469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=36 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=37 name=(null) inode=16470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=38 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=39 name=(null) inode=16471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=40 name=(null) inode=16467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=41 name=(null) inode=16472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=42 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=43 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=44 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=45 name=(null) inode=16474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=46 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=47 name=(null) inode=16475 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=48 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=49 name=(null) inode=16476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=50 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=51 name=(null) inode=16477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=52 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=53 name=(null) inode=16478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=55 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=56 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=57 name=(null) inode=16480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=58 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=59 name=(null) inode=16481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=60 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=61 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=62 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=63 name=(null) inode=16483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=64 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=65 name=(null) inode=16484 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=66 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=67 name=(null) inode=16485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=68 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=69 name=(null) inode=16486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=70 name=(null) inode=16482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=71 name=(null) inode=16487 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=72 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=73 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=74 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=75 name=(null) inode=16489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=76 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=77 name=(null) inode=16490 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=78 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=79 name=(null) inode=16491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=80 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=81 name=(null) inode=16492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=82 name=(null) inode=16488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=83 name=(null) inode=16493 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=84 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=85 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=86 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=87 name=(null) inode=16495 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=88 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=89 name=(null) inode=16496 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=90 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=91 name=(null) inode=16497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=92 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=93 name=(null) inode=16498 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=94 name=(null) inode=16494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=95 name=(null) inode=16499 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=96 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=97 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=98 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=99 name=(null) inode=16501 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=100 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=101 name=(null) inode=16502 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=102 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=103 name=(null) inode=16503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=104 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=105 name=(null) inode=16504 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=106 name=(null) inode=16500 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=107 name=(null) inode=16505 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PATH item=109 name=(null) inode=14969 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:24.786000 audit: PROCTITLE proctitle="(udev-worker)" May 8 00:52:24.880529 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 8 00:52:24.884486 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 8 00:52:24.884787 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 8 00:52:24.884932 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 8 00:52:24.885072 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 8 00:52:24.886499 kernel: mousedev: PS/2 mouse device common for all mice May 8 00:52:25.006027 kernel: kvm: Nested Virtualization enabled May 8 00:52:25.006147 kernel: SVM: kvm: Nested Paging enabled May 8 00:52:25.006177 kernel: SVM: Virtual VMLOAD VMSAVE supported May 8 00:52:25.006192 kernel: SVM: Virtual GIF supported May 8 00:52:25.025587 kernel: EDAC MC: Ver: 3.0.0 May 8 00:52:25.049920 systemd[1]: Finished systemd-udev-settle.service. May 8 00:52:25.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.053798 systemd[1]: Starting lvm2-activation-early.service... May 8 00:52:25.061210 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:25.089341 systemd[1]: Finished lvm2-activation-early.service. May 8 00:52:25.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.090530 systemd[1]: Reached target cryptsetup.target. May 8 00:52:25.106857 systemd[1]: Starting lvm2-activation.service... May 8 00:52:25.110200 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:25.138916 systemd[1]: Finished lvm2-activation.service. May 8 00:52:25.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.189593 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:25.190554 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:52:25.190580 systemd[1]: Reached target local-fs.target. May 8 00:52:25.191482 systemd[1]: Reached target machines.target. May 8 00:52:25.193681 systemd[1]: Starting ldconfig.service... May 8 00:52:25.194820 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:25.194907 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:25.196080 systemd[1]: Starting systemd-boot-update.service... May 8 00:52:25.198037 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:52:25.200592 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:52:25.202814 systemd[1]: Starting systemd-sysext.service... May 8 00:52:25.204204 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) May 8 00:52:25.205385 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:52:25.409716 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:52:25.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.414390 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:52:25.418438 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:52:25.418630 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:52:25.427471 kernel: loop0: detected capacity change from 0 to 205544 May 8 00:52:25.440484 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:52:25.489483 kernel: loop1: detected capacity change from 0 to 205544 May 8 00:52:25.546878 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) May 8 00:52:25.546878 systemd-fsck[1080]: /dev/vda1: 791 files, 120730/258078 clusters May 8 00:52:25.549432 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:52:25.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.552365 systemd[1]: Mounting boot.mount... May 8 00:52:25.554183 (sd-sysext)[1086]: Using extensions 'kubernetes'. May 8 00:52:25.555167 (sd-sysext)[1086]: Merged extensions into '/usr'. May 8 00:52:25.568777 systemd[1]: Mounted boot.mount. May 8 00:52:25.573025 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:25.575095 systemd[1]: Mounting usr-share-oem.mount... May 8 00:52:25.576198 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:25.577687 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:25.579772 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:25.583380 systemd[1]: Starting modprobe@loop.service... May 8 00:52:25.584531 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:25.584667 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:25.584796 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:25.588315 systemd[1]: Finished systemd-boot-update.service. May 8 00:52:25.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.590807 systemd[1]: Mounted usr-share-oem.mount. May 8 00:52:25.592324 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:25.592549 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:25.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.594635 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:25.594789 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:25.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.596726 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:25.596897 systemd[1]: Finished modprobe@loop.service. May 8 00:52:25.599071 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:25.599215 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:25.600603 systemd[1]: Finished systemd-sysext.service. May 8 00:52:25.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.603506 systemd[1]: Starting ensure-sysext.service... May 8 00:52:25.615429 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:52:25.623965 systemd[1]: Reloading. May 8 00:52:25.677722 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-08T00:52:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:25.680220 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-08T00:52:25Z" level=info msg="torcx already run" May 8 00:52:25.780724 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:52:25.782561 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:52:25.784860 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:52:25.820440 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:52:25.844075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:25.844095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:25.862015 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:25.915000 audit: BPF prog-id=27 op=LOAD May 8 00:52:25.915000 audit: BPF prog-id=24 op=UNLOAD May 8 00:52:25.915000 audit: BPF prog-id=28 op=LOAD May 8 00:52:25.915000 audit: BPF prog-id=29 op=LOAD May 8 00:52:25.915000 audit: BPF prog-id=25 op=UNLOAD May 8 00:52:25.915000 audit: BPF prog-id=26 op=UNLOAD May 8 00:52:25.915000 audit: BPF prog-id=30 op=LOAD May 8 00:52:25.915000 audit: BPF prog-id=23 op=UNLOAD May 8 00:52:25.918000 audit: BPF prog-id=31 op=LOAD May 8 00:52:25.918000 audit: BPF prog-id=18 op=UNLOAD May 8 00:52:25.918000 audit: BPF prog-id=32 op=LOAD May 8 00:52:25.918000 audit: BPF prog-id=33 op=LOAD May 8 00:52:25.918000 audit: BPF prog-id=19 op=UNLOAD May 8 00:52:25.918000 audit: BPF prog-id=20 op=UNLOAD May 8 00:52:25.919000 audit: BPF prog-id=34 op=LOAD May 8 00:52:25.919000 audit: BPF prog-id=35 op=LOAD May 8 00:52:25.919000 audit: BPF prog-id=21 op=UNLOAD May 8 00:52:25.919000 audit: BPF prog-id=22 op=UNLOAD May 8 00:52:25.930544 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:25.930732 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:25.931953 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:25.934462 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:25.937199 systemd[1]: Starting modprobe@loop.service... May 8 00:52:25.938003 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:25.938129 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:25.938255 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:25.939141 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:25.939269 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:25.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.940499 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:25.940598 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:25.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.941839 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:25.941942 systemd[1]: Finished modprobe@loop.service. May 8 00:52:25.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:25.943115 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:25.943212 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:25.944754 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:25.944935 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:25.946241 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:25.948239 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:25.950312 systemd[1]: Starting modprobe@loop.service... May 8 00:52:26.016817 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:26.017059 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:26.017184 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:26.018281 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:26.018492 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:26.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.019915 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:26.020030 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:26.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.021255 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:26.021387 systemd[1]: Finished modprobe@loop.service. May 8 00:52:26.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.022582 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:26.022756 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:26.025171 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:26.025417 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:26.027131 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:26.029624 systemd[1]: Starting modprobe@drm.service... May 8 00:52:26.031800 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:26.033995 systemd[1]: Starting modprobe@loop.service... May 8 00:52:26.034840 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:26.034955 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:26.036176 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:52:26.037281 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:52:26.038545 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:52:26.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.072378 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:26.072602 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:26.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.074134 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:26.074301 systemd[1]: Finished modprobe@drm.service. May 8 00:52:26.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.075911 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:26.076085 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:26.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.077605 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:26.077760 systemd[1]: Finished modprobe@loop.service. May 8 00:52:26.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.080840 systemd[1]: Finished ensure-sysext.service. May 8 00:52:26.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.083909 systemd[1]: Starting audit-rules.service... May 8 00:52:26.086604 systemd[1]: Starting clean-ca-certificates.service... May 8 00:52:26.088861 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:52:26.089883 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:26.089947 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:26.090000 audit: BPF prog-id=36 op=LOAD May 8 00:52:26.092341 systemd[1]: Starting systemd-resolved.service... May 8 00:52:26.093000 audit: BPF prog-id=37 op=LOAD May 8 00:52:26.095396 systemd[1]: Starting systemd-timesyncd.service... May 8 00:52:26.097538 systemd[1]: Starting systemd-update-utmp.service... May 8 00:52:26.098943 systemd[1]: Finished clean-ca-certificates.service. May 8 00:52:26.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.101097 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:26.105000 audit[1177]: SYSTEM_BOOT pid=1177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:52:26.108946 systemd[1]: Finished systemd-update-utmp.service. May 8 00:52:26.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.110239 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:52:26.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.224769 systemd-networkd[1043]: eth0: Gained IPv6LL May 8 00:52:26.231495 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:52:26.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:26.257000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:52:26.257000 audit[1191]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe510a6fc0 a2=420 a3=0 items=0 ppid=1166 pid=1191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.257000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:52:26.257878 augenrules[1191]: No rules May 8 00:52:26.258818 systemd[1]: Finished audit-rules.service. May 8 00:52:26.261237 systemd[1]: Started systemd-timesyncd.service. May 8 00:52:26.894126 systemd-timesyncd[1176]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:52:26.894171 systemd-timesyncd[1176]: Initial clock synchronization to Thu 2025-05-08 00:52:26.894026 UTC. May 8 00:52:26.923048 systemd-resolved[1171]: Positive Trust Anchors: May 8 00:52:26.923067 systemd-resolved[1171]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:26.923099 systemd-resolved[1171]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:26.923307 systemd[1]: Reached target time-set.target. May 8 00:52:26.934619 systemd-resolved[1171]: Defaulting to hostname 'linux'. May 8 00:52:26.936626 systemd[1]: Started systemd-resolved.service. May 8 00:52:26.937748 systemd[1]: Reached target network.target. May 8 00:52:26.938633 systemd[1]: Reached target network-online.target. May 8 00:52:26.939591 systemd[1]: Reached target nss-lookup.target. May 8 00:52:27.251076 systemd[1]: Finished ldconfig.service. May 8 00:52:27.255782 systemd[1]: Starting systemd-update-done.service... May 8 00:52:27.435443 systemd[1]: Finished systemd-update-done.service. May 8 00:52:27.436924 systemd[1]: Reached target sysinit.target. May 8 00:52:27.438115 systemd[1]: Started motdgen.path. May 8 00:52:27.439123 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:52:27.443267 systemd[1]: Started logrotate.timer. May 8 00:52:27.444550 systemd[1]: Started mdadm.timer. May 8 00:52:27.445558 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:52:27.463142 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:52:27.463195 systemd[1]: Reached target paths.target. May 8 00:52:27.464628 systemd[1]: Reached target timers.target. May 8 00:52:27.466078 systemd[1]: Listening on dbus.socket. May 8 00:52:27.468965 systemd[1]: Starting docker.socket... May 8 00:52:27.515760 systemd[1]: Listening on sshd.socket. May 8 00:52:27.516750 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:27.517148 systemd[1]: Listening on docker.socket. May 8 00:52:27.518027 systemd[1]: Reached target sockets.target. May 8 00:52:27.518912 systemd[1]: Reached target basic.target. May 8 00:52:27.519922 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:27.519957 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:27.521170 systemd[1]: Starting containerd.service... May 8 00:52:27.523064 systemd[1]: Starting dbus.service... May 8 00:52:27.524792 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:52:27.526884 systemd[1]: Starting extend-filesystems.service... May 8 00:52:27.528000 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:52:27.541470 jq[1203]: false May 8 00:52:27.541839 systemd[1]: Starting kubelet.service... May 8 00:52:27.544164 systemd[1]: Starting motdgen.service... May 8 00:52:27.546611 systemd[1]: Starting prepare-helm.service... May 8 00:52:27.549668 extend-filesystems[1204]: Found loop1 May 8 00:52:27.551014 extend-filesystems[1204]: Found sr0 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda May 8 00:52:27.551014 extend-filesystems[1204]: Found vda1 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda2 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda3 May 8 00:52:27.551014 extend-filesystems[1204]: Found usr May 8 00:52:27.551014 extend-filesystems[1204]: Found vda4 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda6 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda7 May 8 00:52:27.551014 extend-filesystems[1204]: Found vda9 May 8 00:52:27.551014 extend-filesystems[1204]: Checking size of /dev/vda9 May 8 00:52:27.566494 dbus-daemon[1202]: [system] SELinux support is enabled May 8 00:52:27.566087 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:52:27.570738 systemd[1]: Starting sshd-keygen.service... May 8 00:52:27.574092 systemd[1]: Starting systemd-logind.service... May 8 00:52:27.575014 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:27.575097 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:52:27.575547 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:52:27.576220 systemd[1]: Starting update-engine.service... May 8 00:52:27.578167 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:52:27.582032 jq[1224]: true May 8 00:52:27.599470 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:52:27.600550 systemd[1]: Started dbus.service. May 8 00:52:27.603822 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:52:27.606115 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:52:27.606321 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:52:27.608485 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:52:27.608676 systemd[1]: Finished motdgen.service. May 8 00:52:27.617401 extend-filesystems[1204]: Resized partition /dev/vda9 May 8 00:52:27.623067 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:52:27.624673 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:52:27.624851 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:52:27.636167 jq[1233]: true May 8 00:52:27.658428 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:52:27.658479 systemd[1]: Reached target system-config.target. May 8 00:52:27.659932 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:52:27.659973 systemd[1]: Reached target user-config.target. May 8 00:52:27.693410 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:52:27.695064 systemd-logind[1220]: Watching system buttons on /dev/input/event1 (Power Button) May 8 00:52:27.695090 systemd-logind[1220]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 8 00:52:27.696203 systemd-logind[1220]: New seat seat0. May 8 00:52:27.699995 systemd[1]: Started systemd-logind.service. May 8 00:52:27.749101 env[1234]: time="2025-05-08T00:52:27.749010578Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:52:27.764909 env[1234]: time="2025-05-08T00:52:27.764852142Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:52:27.765080 env[1234]: time="2025-05-08T00:52:27.765055764Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.766652 env[1234]: time="2025-05-08T00:52:27.766567489Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:27.766652 env[1234]: time="2025-05-08T00:52:27.766603788Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.766878 env[1234]: time="2025-05-08T00:52:27.766842716Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:27.766878 env[1234]: time="2025-05-08T00:52:27.766873273Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.766949 env[1234]: time="2025-05-08T00:52:27.766891958Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:52:27.766949 env[1234]: time="2025-05-08T00:52:27.766905343Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.767024 env[1234]: time="2025-05-08T00:52:27.767000221Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.767295 env[1234]: time="2025-05-08T00:52:27.767269606Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:27.767423 env[1234]: time="2025-05-08T00:52:27.767398328Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:27.767423 env[1234]: time="2025-05-08T00:52:27.767417975Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:52:27.767496 env[1234]: time="2025-05-08T00:52:27.767471455Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:52:27.767496 env[1234]: time="2025-05-08T00:52:27.767482315Z" level=info msg="metadata content store policy set" policy=shared May 8 00:52:28.114057 tar[1232]: linux-amd64/helm May 8 00:52:28.176394 update_engine[1222]: I0508 00:52:28.176085 1222 main.cc:92] Flatcar Update Engine starting May 8 00:52:28.177937 sshd_keygen[1225]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:52:28.180578 systemd[1]: Started update-engine.service. May 8 00:52:28.181668 update_engine[1222]: I0508 00:52:28.180619 1222 update_check_scheduler.cc:74] Next update check in 6m4s May 8 00:52:28.252709 systemd[1]: Started locksmithd.service. May 8 00:52:28.277571 systemd[1]: Finished sshd-keygen.service. May 8 00:52:28.294037 systemd[1]: Starting issuegen.service... May 8 00:52:28.299569 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:52:28.299720 systemd[1]: Finished issuegen.service. May 8 00:52:28.302065 systemd[1]: Starting systemd-user-sessions.service... May 8 00:52:28.354417 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:52:28.354791 systemd[1]: Finished systemd-user-sessions.service. May 8 00:52:29.417907 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:52:29.417907 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:52:29.417907 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:52:28.357557 systemd[1]: Started getty@tty1.service. May 8 00:52:29.422130 extend-filesystems[1204]: Resized filesystem in /dev/vda9 May 8 00:52:28.359795 systemd[1]: Started serial-getty@ttyS0.service. May 8 00:52:28.360922 systemd[1]: Reached target getty.target. May 8 00:52:28.478084 locksmithd[1263]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:52:29.422067 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:52:29.423184 systemd[1]: Finished extend-filesystems.service. May 8 00:52:29.578272 tar[1232]: linux-amd64/LICENSE May 8 00:52:29.578682 tar[1232]: linux-amd64/README.md May 8 00:52:29.583498 systemd[1]: Finished prepare-helm.service. May 8 00:52:29.718987 env[1234]: time="2025-05-08T00:52:29.718837199Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:52:29.718987 env[1234]: time="2025-05-08T00:52:29.718937788Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:52:29.718987 env[1234]: time="2025-05-08T00:52:29.718975058Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719064105Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719085495Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719099572Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719110913Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719130960Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719146079Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719164563Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719187927Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719207374Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:52:29.719431 env[1234]: time="2025-05-08T00:52:29.719426665Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:52:29.719660 env[1234]: time="2025-05-08T00:52:29.719581445Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:52:29.719990 env[1234]: time="2025-05-08T00:52:29.719960587Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:52:29.720063 env[1234]: time="2025-05-08T00:52:29.720003537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720063 env[1234]: time="2025-05-08T00:52:29.720026570Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:52:29.720131 env[1234]: time="2025-05-08T00:52:29.720110127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720162 env[1234]: time="2025-05-08T00:52:29.720133771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720162 env[1234]: time="2025-05-08T00:52:29.720154941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720226 env[1234]: time="2025-05-08T00:52:29.720184316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720226 env[1234]: time="2025-05-08T00:52:29.720201949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720272 env[1234]: time="2025-05-08T00:52:29.720223830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720272 env[1234]: time="2025-05-08T00:52:29.720243347Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720272 env[1234]: time="2025-05-08T00:52:29.720264617Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720339 env[1234]: time="2025-05-08T00:52:29.720281378Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:52:29.720516 env[1234]: time="2025-05-08T00:52:29.720492765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720552 env[1234]: time="2025-05-08T00:52:29.720520357Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720552 env[1234]: time="2025-05-08T00:52:29.720540775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:52:29.720595 env[1234]: time="2025-05-08T00:52:29.720555402Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:52:29.720623 env[1234]: time="2025-05-08T00:52:29.720588875Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:52:29.720623 env[1234]: time="2025-05-08T00:52:29.720613040Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:52:29.720666 env[1234]: time="2025-05-08T00:52:29.720639540Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:52:29.720721 env[1234]: time="2025-05-08T00:52:29.720701667Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:52:29.721103 env[1234]: time="2025-05-08T00:52:29.721019974Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:52:29.722061 env[1234]: time="2025-05-08T00:52:29.721113319Z" level=info msg="Connect containerd service" May 8 00:52:29.722061 env[1234]: time="2025-05-08T00:52:29.721182669Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:52:29.722061 env[1234]: time="2025-05-08T00:52:29.721951892Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:52:29.722254 env[1234]: time="2025-05-08T00:52:29.722235143Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:52:29.722314 env[1234]: time="2025-05-08T00:52:29.722209695Z" level=info msg="Start subscribing containerd event" May 8 00:52:29.722314 env[1234]: time="2025-05-08T00:52:29.722293533Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:52:29.722362 env[1234]: time="2025-05-08T00:52:29.722320293Z" level=info msg="Start recovering state" May 8 00:52:29.722456 env[1234]: time="2025-05-08T00:52:29.722437623Z" level=info msg="Start event monitor" May 8 00:52:29.722515 env[1234]: time="2025-05-08T00:52:29.722463622Z" level=info msg="Start snapshots syncer" May 8 00:52:29.722515 env[1234]: time="2025-05-08T00:52:29.722478229Z" level=info msg="Start cni network conf syncer for default" May 8 00:52:29.722515 env[1234]: time="2025-05-08T00:52:29.722487136Z" level=info msg="Start streaming server" May 8 00:52:29.722515 systemd[1]: Started containerd.service. May 8 00:52:29.722979 env[1234]: time="2025-05-08T00:52:29.722910520Z" level=info msg="containerd successfully booted in 1.976095s" May 8 00:52:29.925582 bash[1249]: Updated "/home/core/.ssh/authorized_keys" May 8 00:52:29.926533 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:52:30.656848 systemd[1]: Started kubelet.service. May 8 00:52:30.658710 systemd[1]: Reached target multi-user.target. May 8 00:52:30.661661 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:52:30.670394 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:52:30.670571 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:52:30.671809 systemd[1]: Startup finished in 874ms (kernel) + 6.143s (initrd) + 13.089s (userspace) = 20.108s. May 8 00:52:31.204464 kubelet[1283]: E0508 00:52:31.204333 1283 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:31.207093 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:31.207236 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:31.207520 systemd[1]: kubelet.service: Consumed 1.323s CPU time. May 8 00:52:35.576692 systemd[1]: Created slice system-sshd.slice. May 8 00:52:35.577884 systemd[1]: Started sshd@0-10.0.0.137:22-10.0.0.1:43316.service. May 8 00:52:37.043279 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 43316 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.045004 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.054192 systemd[1]: Created slice user-500.slice. May 8 00:52:37.055766 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:52:37.057565 systemd-logind[1220]: New session 1 of user core. May 8 00:52:37.064466 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:52:37.066153 systemd[1]: Starting user@500.service... May 8 00:52:37.069123 (systemd)[1295]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.140478 systemd[1295]: Queued start job for default target default.target. May 8 00:52:37.140978 systemd[1295]: Reached target paths.target. May 8 00:52:37.140995 systemd[1295]: Reached target sockets.target. May 8 00:52:37.141008 systemd[1295]: Reached target timers.target. May 8 00:52:37.141021 systemd[1295]: Reached target basic.target. May 8 00:52:37.141066 systemd[1295]: Reached target default.target. May 8 00:52:37.141096 systemd[1295]: Startup finished in 66ms. May 8 00:52:37.141185 systemd[1]: Started user@500.service. May 8 00:52:37.142479 systemd[1]: Started session-1.scope. May 8 00:52:37.195285 systemd[1]: Started sshd@1-10.0.0.137:22-10.0.0.1:43326.service. May 8 00:52:37.232130 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 43326 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.234077 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.239140 systemd-logind[1220]: New session 2 of user core. May 8 00:52:37.240655 systemd[1]: Started session-2.scope. May 8 00:52:37.303323 sshd[1304]: pam_unix(sshd:session): session closed for user core May 8 00:52:37.308288 systemd[1]: Started sshd@2-10.0.0.137:22-10.0.0.1:43332.service. May 8 00:52:37.309073 systemd[1]: sshd@1-10.0.0.137:22-10.0.0.1:43326.service: Deactivated successfully. May 8 00:52:37.309936 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:52:37.310608 systemd-logind[1220]: Session 2 logged out. Waiting for processes to exit. May 8 00:52:37.311580 systemd-logind[1220]: Removed session 2. May 8 00:52:37.345572 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 43332 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.347079 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.351857 systemd-logind[1220]: New session 3 of user core. May 8 00:52:37.352832 systemd[1]: Started session-3.scope. May 8 00:52:37.404610 sshd[1309]: pam_unix(sshd:session): session closed for user core May 8 00:52:37.407639 systemd[1]: sshd@2-10.0.0.137:22-10.0.0.1:43332.service: Deactivated successfully. May 8 00:52:37.408159 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:52:37.408642 systemd-logind[1220]: Session 3 logged out. Waiting for processes to exit. May 8 00:52:37.409681 systemd[1]: Started sshd@3-10.0.0.137:22-10.0.0.1:43404.service. May 8 00:52:37.410539 systemd-logind[1220]: Removed session 3. May 8 00:52:37.445790 sshd[1316]: Accepted publickey for core from 10.0.0.1 port 43404 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.447199 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.451366 systemd-logind[1220]: New session 4 of user core. May 8 00:52:37.452362 systemd[1]: Started session-4.scope. May 8 00:52:37.510608 sshd[1316]: pam_unix(sshd:session): session closed for user core May 8 00:52:37.514919 systemd[1]: sshd@3-10.0.0.137:22-10.0.0.1:43404.service: Deactivated successfully. May 8 00:52:37.515736 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:52:37.516663 systemd-logind[1220]: Session 4 logged out. Waiting for processes to exit. May 8 00:52:37.518218 systemd[1]: Started sshd@4-10.0.0.137:22-10.0.0.1:43410.service. May 8 00:52:37.519178 systemd-logind[1220]: Removed session 4. May 8 00:52:37.555607 sshd[1322]: Accepted publickey for core from 10.0.0.1 port 43410 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.557199 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.560876 systemd-logind[1220]: New session 5 of user core. May 8 00:52:37.561711 systemd[1]: Started session-5.scope. May 8 00:52:37.620697 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:52:37.620944 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:37.632610 dbus-daemon[1202]: \xd0]\xdc]\xdfU: received setenforce notice (enforcing=-1660303632) May 8 00:52:37.634684 sudo[1325]: pam_unix(sudo:session): session closed for user root May 8 00:52:37.636900 sshd[1322]: pam_unix(sshd:session): session closed for user core May 8 00:52:37.640469 systemd[1]: sshd@4-10.0.0.137:22-10.0.0.1:43410.service: Deactivated successfully. May 8 00:52:37.641175 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:52:37.641818 systemd-logind[1220]: Session 5 logged out. Waiting for processes to exit. May 8 00:52:37.643199 systemd[1]: Started sshd@5-10.0.0.137:22-10.0.0.1:43416.service. May 8 00:52:37.644019 systemd-logind[1220]: Removed session 5. May 8 00:52:37.682809 sshd[1329]: Accepted publickey for core from 10.0.0.1 port 43416 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.684155 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.688060 systemd-logind[1220]: New session 6 of user core. May 8 00:52:37.689115 systemd[1]: Started session-6.scope. May 8 00:52:37.744077 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:52:37.744404 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:37.748705 sudo[1333]: pam_unix(sudo:session): session closed for user root May 8 00:52:37.754227 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:52:37.754488 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:37.765771 systemd[1]: Stopping audit-rules.service... May 8 00:52:37.766000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:37.767340 auditctl[1336]: No rules May 8 00:52:37.767724 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:52:37.767891 systemd[1]: Stopped audit-rules.service. May 8 00:52:37.769322 kernel: kauditd_printk_skb: 232 callbacks suppressed May 8 00:52:37.769442 kernel: audit: type=1305 audit(1746665557.766:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:37.769823 systemd[1]: Starting audit-rules.service... May 8 00:52:37.766000 audit[1336]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4ad8b0f0 a2=420 a3=0 items=0 ppid=1 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:37.776417 kernel: audit: type=1300 audit(1746665557.766:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4ad8b0f0 a2=420 a3=0 items=0 ppid=1 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:37.776545 kernel: audit: type=1327 audit(1746665557.766:211): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:37.766000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:37.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.781288 kernel: audit: type=1131 audit(1746665557.766:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.797744 augenrules[1353]: No rules May 8 00:52:37.799110 systemd[1]: Finished audit-rules.service. May 8 00:52:37.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.800598 sudo[1332]: pam_unix(sudo:session): session closed for user root May 8 00:52:37.802312 sshd[1329]: pam_unix(sshd:session): session closed for user core May 8 00:52:37.799000 audit[1332]: USER_END pid=1332 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:37.805815 systemd[1]: sshd@5-10.0.0.137:22-10.0.0.1:43416.service: Deactivated successfully. May 8 00:52:37.806472 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:52:37.808231 kernel: audit: type=1130 audit(1746665557.798:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.808365 kernel: audit: type=1106 audit(1746665557.799:214): pid=1332 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:37.808530 kernel: audit: type=1104 audit(1746665557.799:215): pid=1332 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:37.799000 audit[1332]: CRED_DISP pid=1332 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:37.808732 systemd-logind[1220]: Session 6 logged out. Waiting for processes to exit. May 8 00:52:37.809088 systemd[1]: Started sshd@6-10.0.0.137:22-10.0.0.1:43418.service. May 8 00:52:37.811044 systemd-logind[1220]: Removed session 6. May 8 00:52:37.803000 audit[1329]: USER_END pid=1329 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.817707 kernel: audit: type=1106 audit(1746665557.803:216): pid=1329 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.817805 kernel: audit: type=1104 audit(1746665557.803:217): pid=1329 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.803000 audit[1329]: CRED_DISP pid=1329 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.137:22-10.0.0.1:43416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.948267 kernel: audit: type=1131 audit(1746665557.803:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.137:22-10.0.0.1:43416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.973000 audit[1359]: USER_ACCT pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.973781 sshd[1359]: Accepted publickey for core from 10.0.0.1 port 43418 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:52:37.974000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.974000 audit[1359]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffebed8d40 a2=3 a3=0 items=0 ppid=1 pid=1359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:37.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:37.974929 sshd[1359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:37.978876 systemd-logind[1220]: New session 7 of user core. May 8 00:52:37.979877 systemd[1]: Started session-7.scope. May 8 00:52:37.983000 audit[1359]: USER_START pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:37.985000 audit[1361]: CRED_ACQ pid=1361 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:38.033000 audit[1362]: USER_ACCT pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:38.033000 audit[1362]: CRED_REFR pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:38.034115 sudo[1362]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:52:38.034340 sudo[1362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:38.035000 audit[1362]: USER_START pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:38.072127 systemd[1]: Starting docker.service... May 8 00:52:38.137773 env[1374]: time="2025-05-08T00:52:38.137701072Z" level=info msg="Starting up" May 8 00:52:38.140917 env[1374]: time="2025-05-08T00:52:38.138995620Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:52:38.140917 env[1374]: time="2025-05-08T00:52:38.140910632Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:52:38.141022 env[1374]: time="2025-05-08T00:52:38.140951028Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:52:38.141022 env[1374]: time="2025-05-08T00:52:38.140964062Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:52:38.142709 env[1374]: time="2025-05-08T00:52:38.142680632Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:52:38.142709 env[1374]: time="2025-05-08T00:52:38.142698115Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:52:38.142795 env[1374]: time="2025-05-08T00:52:38.142711009Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:52:38.142795 env[1374]: time="2025-05-08T00:52:38.142719094Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:52:38.147658 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport862759479-merged.mount: Deactivated successfully. May 8 00:52:38.913658 env[1374]: time="2025-05-08T00:52:38.913576813Z" level=info msg="Loading containers: start." May 8 00:52:38.968000 audit[1408]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.968000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd963cc530 a2=0 a3=7ffd963cc51c items=0 ppid=1374 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:52:38.970000 audit[1410]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.970000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff359c8d30 a2=0 a3=7fff359c8d1c items=0 ppid=1374 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:52:38.972000 audit[1412]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.972000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffef86f5490 a2=0 a3=7ffef86f547c items=0 ppid=1374 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:52:38.974000 audit[1414]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.974000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd93778320 a2=0 a3=7ffd9377830c items=0 ppid=1374 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:52:38.976000 audit[1416]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.976000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8d507800 a2=0 a3=7ffe8d5077ec items=0 ppid=1374 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:52:38.990000 audit[1421]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:38.990000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec04568b0 a2=0 a3=7ffec045689c items=0 ppid=1374 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:38.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:52:39.216000 audit[1423]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.216000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef8e2b8e0 a2=0 a3=7ffef8e2b8cc items=0 ppid=1374 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:52:39.218000 audit[1425]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.218000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd0c90a360 a2=0 a3=7ffd0c90a34c items=0 ppid=1374 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:52:39.220000 audit[1427]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.220000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe817addf0 a2=0 a3=7ffe817adddc items=0 ppid=1374 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:39.254000 audit[1431]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.254000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcbc59cf50 a2=0 a3=7ffcbc59cf3c items=0 ppid=1374 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:39.260000 audit[1432]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.260000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff87aad790 a2=0 a3=7fff87aad77c items=0 ppid=1374 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:39.270622 kernel: Initializing XFRM netlink socket May 8 00:52:39.302781 env[1374]: time="2025-05-08T00:52:39.302728901Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:52:39.320000 audit[1440]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.320000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff52be3a10 a2=0 a3=7fff52be39fc items=0 ppid=1374 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:52:39.332000 audit[1443]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.332000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe42ad1e50 a2=0 a3=7ffe42ad1e3c items=0 ppid=1374 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:52:39.335000 audit[1446]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.335000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff0e8df4b0 a2=0 a3=7fff0e8df49c items=0 ppid=1374 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:52:39.337000 audit[1448]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.337000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcdbecc930 a2=0 a3=7ffcdbecc91c items=0 ppid=1374 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:52:39.340000 audit[1450]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.340000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe3eec15e0 a2=0 a3=7ffe3eec15cc items=0 ppid=1374 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:52:39.342000 audit[1452]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.342000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd401714d0 a2=0 a3=7ffd401714bc items=0 ppid=1374 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:52:39.345000 audit[1454]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.345000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd3007adc0 a2=0 a3=7ffd3007adac items=0 ppid=1374 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.345000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:52:39.354000 audit[1457]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.354000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc56e2d170 a2=0 a3=7ffc56e2d15c items=0 ppid=1374 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:52:39.359000 audit[1459]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.359000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe8fc39460 a2=0 a3=7ffe8fc3944c items=0 ppid=1374 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:52:39.362000 audit[1461]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.362000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd94430c30 a2=0 a3=7ffd94430c1c items=0 ppid=1374 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:52:39.364000 audit[1463]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.364000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0076aa70 a2=0 a3=7ffd0076aa5c items=0 ppid=1374 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:52:39.365781 systemd-networkd[1043]: docker0: Link UP May 8 00:52:39.381000 audit[1467]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.381000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedb3ccd30 a2=0 a3=7ffedb3ccd1c items=0 ppid=1374 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:39.388000 audit[1468]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:39.388000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff0d8a4ef0 a2=0 a3=7fff0d8a4edc items=0 ppid=1374 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:39.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:39.389435 env[1374]: time="2025-05-08T00:52:39.389363463Z" level=info msg="Loading containers: done." May 8 00:52:39.400166 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4150515808-merged.mount: Deactivated successfully. May 8 00:52:39.410986 env[1374]: time="2025-05-08T00:52:39.410894208Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:52:39.411186 env[1374]: time="2025-05-08T00:52:39.411165046Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:52:39.411321 env[1374]: time="2025-05-08T00:52:39.411297464Z" level=info msg="Daemon has completed initialization" May 8 00:52:39.448850 systemd[1]: Started docker.service. May 8 00:52:39.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.454060 env[1374]: time="2025-05-08T00:52:39.453967832Z" level=info msg="API listen on /run/docker.sock" May 8 00:52:40.473033 env[1234]: time="2025-05-08T00:52:40.472983935Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 8 00:52:41.267932 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:52:41.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.268093 systemd[1]: Stopped kubelet.service. May 8 00:52:41.268152 systemd[1]: kubelet.service: Consumed 1.323s CPU time. May 8 00:52:41.269785 systemd[1]: Starting kubelet.service... May 8 00:52:41.277252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount232061740.mount: Deactivated successfully. May 8 00:52:41.366784 systemd[1]: Started kubelet.service. May 8 00:52:41.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.418331 kubelet[1508]: E0508 00:52:41.418251 1508 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:41.422340 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:41.422483 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:41.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:52:48.687670 env[1234]: time="2025-05-08T00:52:48.687529514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:48.871683 env[1234]: time="2025-05-08T00:52:48.871594668Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.085827 env[1234]: time="2025-05-08T00:52:49.085739623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.149820 env[1234]: time="2025-05-08T00:52:49.149727846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.150759 env[1234]: time="2025-05-08T00:52:49.150698527Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 8 00:52:49.194655 env[1234]: time="2025-05-08T00:52:49.194573804Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 8 00:52:51.535444 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:52:51.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.535715 systemd[1]: Stopped kubelet.service. May 8 00:52:51.536863 kernel: kauditd_printk_skb: 88 callbacks suppressed May 8 00:52:51.536939 kernel: audit: type=1130 audit(1746665571.535:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.537423 systemd[1]: Starting kubelet.service... May 8 00:52:51.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.546055 kernel: audit: type=1131 audit(1746665571.535:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.676335 systemd[1]: Started kubelet.service. May 8 00:52:51.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.680446 kernel: audit: type=1130 audit(1746665571.676:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:52.103314 kubelet[1521]: E0508 00:52:52.103239 1521 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:52.105073 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:52.105245 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:52.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:52:52.109423 kernel: audit: type=1131 audit(1746665572.105:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:52:54.385270 env[1234]: time="2025-05-08T00:52:54.385194515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.387204 env[1234]: time="2025-05-08T00:52:54.387166194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.389437 env[1234]: time="2025-05-08T00:52:54.389380978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.391336 env[1234]: time="2025-05-08T00:52:54.391299426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.392218 env[1234]: time="2025-05-08T00:52:54.392176982Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 8 00:52:54.392852 env[1234]: time="2025-05-08T00:52:54.392821942Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 8 00:52:57.771658 env[1234]: time="2025-05-08T00:52:57.771560720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.774235 env[1234]: time="2025-05-08T00:52:57.774172048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.776437 env[1234]: time="2025-05-08T00:52:57.776355584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.779699 env[1234]: time="2025-05-08T00:52:57.779622181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:57.780657 env[1234]: time="2025-05-08T00:52:57.780600767Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 8 00:52:57.781270 env[1234]: time="2025-05-08T00:52:57.781228554Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 8 00:53:00.857107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2633020056.mount: Deactivated successfully. May 8 00:53:02.285504 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 8 00:53:02.285825 systemd[1]: Stopped kubelet.service. May 8 00:53:02.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.288181 systemd[1]: Starting kubelet.service... May 8 00:53:02.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.294205 kernel: audit: type=1130 audit(1746665582.285:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.294307 kernel: audit: type=1131 audit(1746665582.285:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.748064 systemd[1]: Started kubelet.service. May 8 00:53:02.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.752418 kernel: audit: type=1130 audit(1746665582.747:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:03.158989 kubelet[1532]: E0508 00:53:03.158910 1532 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:53:03.160812 env[1234]: time="2025-05-08T00:53:03.160748461Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:03.161041 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:53:03.161160 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:53:03.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:03.165204 env[1234]: time="2025-05-08T00:53:03.163101481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:03.165405 kernel: audit: type=1131 audit(1746665583.160:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:03.165473 env[1234]: time="2025-05-08T00:53:03.165347177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:03.166161 env[1234]: time="2025-05-08T00:53:03.166123468Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:03.166657 env[1234]: time="2025-05-08T00:53:03.166512095Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 8 00:53:03.167485 env[1234]: time="2025-05-08T00:53:03.167452151Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 8 00:53:03.721812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1963395933.mount: Deactivated successfully. May 8 00:53:06.041005 env[1234]: time="2025-05-08T00:53:06.040901953Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:06.127791 env[1234]: time="2025-05-08T00:53:06.127705747Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:06.149343 env[1234]: time="2025-05-08T00:53:06.149268371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:06.154748 env[1234]: time="2025-05-08T00:53:06.154695915Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:06.156137 env[1234]: time="2025-05-08T00:53:06.156029125Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 8 00:53:06.156936 env[1234]: time="2025-05-08T00:53:06.156883720Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 8 00:53:08.288915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount433683028.mount: Deactivated successfully. May 8 00:53:08.307800 env[1234]: time="2025-05-08T00:53:08.307698579Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:08.310790 env[1234]: time="2025-05-08T00:53:08.310747038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:08.313663 env[1234]: time="2025-05-08T00:53:08.313621946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:08.316413 env[1234]: time="2025-05-08T00:53:08.316384097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:08.317022 env[1234]: time="2025-05-08T00:53:08.316979104Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 8 00:53:08.317680 env[1234]: time="2025-05-08T00:53:08.317576975Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 8 00:53:08.866659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4114069320.mount: Deactivated successfully. May 8 00:53:13.285305 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 8 00:53:13.285583 systemd[1]: Stopped kubelet.service. May 8 00:53:13.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.287287 systemd[1]: Starting kubelet.service... May 8 00:53:13.294904 kernel: audit: type=1130 audit(1746665593.284:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.295059 kernel: audit: type=1131 audit(1746665593.284:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.386477 systemd[1]: Started kubelet.service. May 8 00:53:13.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.391444 kernel: audit: type=1130 audit(1746665593.385:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:13.448631 kubelet[1544]: E0508 00:53:13.448553 1544 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:53:13.451974 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:53:13.452149 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:53:13.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:13.456406 kernel: audit: type=1131 audit(1746665593.449:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:13.576849 update_engine[1222]: I0508 00:53:13.576627 1222 update_attempter.cc:509] Updating boot flags... May 8 00:53:15.964026 env[1234]: time="2025-05-08T00:53:15.963950974Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:15.967008 env[1234]: time="2025-05-08T00:53:15.966976573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:15.969058 env[1234]: time="2025-05-08T00:53:15.969034617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:15.970995 env[1234]: time="2025-05-08T00:53:15.970968484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:15.971677 env[1234]: time="2025-05-08T00:53:15.971647382Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 8 00:53:18.562272 systemd[1]: Stopped kubelet.service. May 8 00:53:18.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:18.564264 systemd[1]: Starting kubelet.service... May 8 00:53:18.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:18.568572 kernel: audit: type=1130 audit(1746665598.561:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:18.568648 kernel: audit: type=1131 audit(1746665598.561:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:18.588750 systemd[1]: Reloading. May 8 00:53:18.662712 /usr/lib/systemd/system-generators/torcx-generator[1613]: time="2025-05-08T00:53:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:53:18.662744 /usr/lib/systemd/system-generators/torcx-generator[1613]: time="2025-05-08T00:53:18Z" level=info msg="torcx already run" May 8 00:53:19.243484 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:53:19.243502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:53:19.261289 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:53:19.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.329353 kernel: audit: type=1400 audit(1746665599.321:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.329440 kernel: audit: type=1400 audit(1746665599.321:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.335638 kernel: audit: type=1400 audit(1746665599.321:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.335690 kernel: audit: type=1400 audit(1746665599.321:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.335713 kernel: audit: type=1400 audit(1746665599.321:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.338927 kernel: audit: type=1400 audit(1746665599.321:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345021 kernel: audit: type=1400 audit(1746665599.321:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345075 kernel: audit: type=1400 audit(1746665599.321:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.327000 audit: BPF prog-id=43 op=LOAD May 8 00:53:19.327000 audit: BPF prog-id=27 op=UNLOAD May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit: BPF prog-id=44 op=LOAD May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit: BPF prog-id=45 op=LOAD May 8 00:53:19.331000 audit: BPF prog-id=28 op=UNLOAD May 8 00:53:19.331000 audit: BPF prog-id=29 op=UNLOAD May 8 00:53:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.337000 audit: BPF prog-id=46 op=LOAD May 8 00:53:19.337000 audit: BPF prog-id=30 op=UNLOAD May 8 00:53:19.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.343000 audit: BPF prog-id=47 op=LOAD May 8 00:53:19.343000 audit: BPF prog-id=36 op=UNLOAD May 8 00:53:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit: BPF prog-id=48 op=LOAD May 8 00:53:19.347000 audit: BPF prog-id=31 op=UNLOAD May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit: BPF prog-id=49 op=LOAD May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit: BPF prog-id=50 op=LOAD May 8 00:53:19.347000 audit: BPF prog-id=32 op=UNLOAD May 8 00:53:19.347000 audit: BPF prog-id=33 op=UNLOAD May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit: BPF prog-id=51 op=LOAD May 8 00:53:19.348000 audit: BPF prog-id=37 op=UNLOAD May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.348000 audit: BPF prog-id=52 op=LOAD May 8 00:53:19.348000 audit: BPF prog-id=41 op=UNLOAD May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit: BPF prog-id=53 op=LOAD May 8 00:53:19.350000 audit: BPF prog-id=38 op=UNLOAD May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit: BPF prog-id=54 op=LOAD May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.350000 audit: BPF prog-id=55 op=LOAD May 8 00:53:19.350000 audit: BPF prog-id=39 op=UNLOAD May 8 00:53:19.350000 audit: BPF prog-id=40 op=UNLOAD May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit: BPF prog-id=56 op=LOAD May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:19.351000 audit: BPF prog-id=57 op=LOAD May 8 00:53:19.351000 audit: BPF prog-id=34 op=UNLOAD May 8 00:53:19.351000 audit: BPF prog-id=35 op=UNLOAD May 8 00:53:19.362623 systemd[1]: Started kubelet.service. May 8 00:53:19.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:19.366048 systemd[1]: Stopping kubelet.service... May 8 00:53:19.366682 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:53:19.366846 systemd[1]: Stopped kubelet.service. May 8 00:53:19.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:19.368350 systemd[1]: Starting kubelet.service... May 8 00:53:19.448871 systemd[1]: Started kubelet.service. May 8 00:53:19.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:19.504242 kubelet[1666]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:19.504242 kubelet[1666]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:53:19.504242 kubelet[1666]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:19.504242 kubelet[1666]: I0508 00:53:19.504215 1666 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:53:20.016359 kubelet[1666]: I0508 00:53:20.016293 1666 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 8 00:53:20.016359 kubelet[1666]: I0508 00:53:20.016346 1666 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:53:20.016750 kubelet[1666]: I0508 00:53:20.016720 1666 server.go:929] "Client rotation is on, will bootstrap in background" May 8 00:53:20.124632 kubelet[1666]: E0508 00:53:20.124568 1666 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.137:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:20.128385 kubelet[1666]: I0508 00:53:20.128326 1666 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:53:20.136286 kubelet[1666]: E0508 00:53:20.136249 1666 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:53:20.136286 kubelet[1666]: I0508 00:53:20.136283 1666 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:53:20.143892 kubelet[1666]: I0508 00:53:20.143864 1666 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:53:20.144774 kubelet[1666]: I0508 00:53:20.144743 1666 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 8 00:53:20.144952 kubelet[1666]: I0508 00:53:20.144900 1666 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:53:20.145356 kubelet[1666]: I0508 00:53:20.144947 1666 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:53:20.145528 kubelet[1666]: I0508 00:53:20.145404 1666 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:53:20.145528 kubelet[1666]: I0508 00:53:20.145422 1666 container_manager_linux.go:300] "Creating device plugin manager" May 8 00:53:20.145635 kubelet[1666]: I0508 00:53:20.145598 1666 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:20.160665 kubelet[1666]: I0508 00:53:20.160631 1666 kubelet.go:408] "Attempting to sync node with API server" May 8 00:53:20.160758 kubelet[1666]: I0508 00:53:20.160683 1666 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:53:20.160758 kubelet[1666]: I0508 00:53:20.160734 1666 kubelet.go:314] "Adding apiserver pod source" May 8 00:53:20.160758 kubelet[1666]: I0508 00:53:20.160747 1666 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:53:20.161468 kubelet[1666]: W0508 00:53:20.161403 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:20.161518 kubelet[1666]: E0508 00:53:20.161500 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:20.162184 kubelet[1666]: W0508 00:53:20.162120 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:20.162274 kubelet[1666]: E0508 00:53:20.162188 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:20.174990 kubelet[1666]: I0508 00:53:20.174961 1666 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:53:20.195903 kubelet[1666]: I0508 00:53:20.195862 1666 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:53:20.196562 kubelet[1666]: W0508 00:53:20.196535 1666 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:53:20.197218 kubelet[1666]: I0508 00:53:20.197194 1666 server.go:1269] "Started kubelet" May 8 00:53:20.197349 kubelet[1666]: I0508 00:53:20.197310 1666 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:53:20.198281 kubelet[1666]: I0508 00:53:20.198258 1666 server.go:460] "Adding debug handlers to kubelet server" May 8 00:53:20.198000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.198000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:20.198000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006f7f20 a1=c00089cc18 a2=c0006f7ef0 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.198000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:20.198000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:20.198000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:20.198000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000475460 a1=c00089cc30 a2=c0006f7fb0 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.198000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:20.200732 kubelet[1666]: I0508 00:53:20.199987 1666 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:53:20.200732 kubelet[1666]: I0508 00:53:20.200019 1666 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:53:20.200732 kubelet[1666]: I0508 00:53:20.200079 1666 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:53:20.201000 audit[1678]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.201000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdabd41ba0 a2=0 a3=7ffdabd41b8c items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:53:20.203000 audit[1679]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.203000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9d9b2890 a2=0 a3=7ffc9d9b287c items=0 ppid=1666 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:53:20.212312 kubelet[1666]: I0508 00:53:20.212257 1666 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:53:20.213005 kubelet[1666]: E0508 00:53:20.212493 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.212000 audit[1681]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.212000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff00d34d80 a2=0 a3=7fff00d34d6c items=0 ppid=1666 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:20.214695 kubelet[1666]: I0508 00:53:20.214519 1666 volume_manager.go:289] "Starting Kubelet Volume Manager" May 8 00:53:20.214695 kubelet[1666]: I0508 00:53:20.214658 1666 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 8 00:53:20.214846 kubelet[1666]: I0508 00:53:20.214771 1666 reconciler.go:26] "Reconciler: start to sync state" May 8 00:53:20.215231 kubelet[1666]: W0508 00:53:20.215181 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:20.215290 kubelet[1666]: E0508 00:53:20.215233 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:20.215355 kubelet[1666]: E0508 00:53:20.215328 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.137:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.137:6443: connect: connection refused" interval="200ms" May 8 00:53:20.215575 kubelet[1666]: I0508 00:53:20.215544 1666 factory.go:221] Registration of the systemd container factory successfully May 8 00:53:20.215655 kubelet[1666]: I0508 00:53:20.215634 1666 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:53:20.216012 kubelet[1666]: E0508 00:53:20.214796 1666 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.137:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.137:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d671bf1258261 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:53:20.197165665 +0000 UTC m=+0.743293833,LastTimestamp:2025-05-08 00:53:20.197165665 +0000 UTC m=+0.743293833,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:53:20.215000 audit[1683]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.215000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6b2a57b0 a2=0 a3=7ffc6b2a579c items=0 ppid=1666 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:20.216993 kubelet[1666]: I0508 00:53:20.216369 1666 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:53:20.216993 kubelet[1666]: I0508 00:53:20.216635 1666 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:53:20.217092 kubelet[1666]: I0508 00:53:20.217001 1666 factory.go:221] Registration of the containerd container factory successfully May 8 00:53:20.223000 audit[1686]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.223000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff315c3b80 a2=0 a3=7fff315c3b6c items=0 ppid=1666 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:53:20.224954 kubelet[1666]: I0508 00:53:20.224902 1666 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:53:20.225000 audit[1687]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:20.225000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6e0317c0 a2=0 a3=7ffc6e0317ac items=0 ppid=1666 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:53:20.227625 kubelet[1666]: I0508 00:53:20.227577 1666 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:53:20.227715 kubelet[1666]: I0508 00:53:20.227635 1666 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:53:20.227715 kubelet[1666]: I0508 00:53:20.227667 1666 kubelet.go:2321] "Starting kubelet main sync loop" May 8 00:53:20.227787 kubelet[1666]: E0508 00:53:20.227725 1666 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:53:20.227000 audit[1689]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.227000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe242a3020 a2=0 a3=7ffe242a300c items=0 ppid=1666 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:53:20.228000 audit[1691]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.228000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda8906d0 a2=0 a3=7ffeda8906bc items=0 ppid=1666 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:53:20.229000 audit[1693]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:20.229000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9ebb31b0 a2=0 a3=7ffc9ebb319c items=0 ppid=1666 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:53:20.230000 audit[1695]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:20.230000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff819d16c0 a2=0 a3=7fff819d16ac items=0 ppid=1666 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:53:20.231997 kubelet[1666]: W0508 00:53:20.231804 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:20.231997 kubelet[1666]: E0508 00:53:20.231879 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:20.232749 kubelet[1666]: I0508 00:53:20.232723 1666 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:53:20.232749 kubelet[1666]: I0508 00:53:20.232739 1666 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:53:20.232868 kubelet[1666]: I0508 00:53:20.232760 1666 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:20.231000 audit[1698]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:20.231000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd2910ace0 a2=0 a3=7ffd2910accc items=0 ppid=1666 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:53:20.233000 audit[1699]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:20.233000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd94aeae30 a2=0 a3=7ffd94aeae1c items=0 ppid=1666 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:53:20.313123 kubelet[1666]: E0508 00:53:20.313049 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.328555 kubelet[1666]: E0508 00:53:20.328508 1666 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:53:20.413840 kubelet[1666]: E0508 00:53:20.413748 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.416641 kubelet[1666]: E0508 00:53:20.416553 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.137:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.137:6443: connect: connection refused" interval="400ms" May 8 00:53:20.514686 kubelet[1666]: E0508 00:53:20.514639 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.529029 kubelet[1666]: E0508 00:53:20.528968 1666 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:53:20.615402 kubelet[1666]: E0508 00:53:20.615237 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.716401 kubelet[1666]: E0508 00:53:20.716333 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.816908 kubelet[1666]: E0508 00:53:20.816849 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.817296 kubelet[1666]: E0508 00:53:20.817251 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.137:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.137:6443: connect: connection refused" interval="800ms" May 8 00:53:20.917816 kubelet[1666]: E0508 00:53:20.917655 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:20.929952 kubelet[1666]: E0508 00:53:20.929918 1666 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:53:21.018393 kubelet[1666]: E0508 00:53:21.018323 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.118896 kubelet[1666]: E0508 00:53:21.118825 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.162842 kubelet[1666]: W0508 00:53:21.162784 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:21.162968 kubelet[1666]: E0508 00:53:21.162842 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:21.214508 kubelet[1666]: W0508 00:53:21.214386 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:21.214508 kubelet[1666]: E0508 00:53:21.214454 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:21.219692 kubelet[1666]: E0508 00:53:21.219662 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.320524 kubelet[1666]: E0508 00:53:21.320463 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.400496 kubelet[1666]: W0508 00:53:21.400410 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:21.400684 kubelet[1666]: E0508 00:53:21.400506 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:21.421092 kubelet[1666]: E0508 00:53:21.421032 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.468032 kubelet[1666]: W0508 00:53:21.467929 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:21.468032 kubelet[1666]: E0508 00:53:21.467966 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:21.521681 kubelet[1666]: E0508 00:53:21.521602 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.618886 kubelet[1666]: E0508 00:53:21.618803 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.137:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.137:6443: connect: connection refused" interval="1.6s" May 8 00:53:21.622055 kubelet[1666]: E0508 00:53:21.622025 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.636684 kubelet[1666]: I0508 00:53:21.636652 1666 policy_none.go:49] "None policy: Start" May 8 00:53:21.637423 kubelet[1666]: I0508 00:53:21.637407 1666 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:53:21.637509 kubelet[1666]: I0508 00:53:21.637456 1666 state_mem.go:35] "Initializing new in-memory state store" May 8 00:53:21.723269 kubelet[1666]: E0508 00:53:21.723095 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.730401 kubelet[1666]: E0508 00:53:21.730354 1666 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:53:21.824106 kubelet[1666]: E0508 00:53:21.823952 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:21.836350 systemd[1]: Created slice kubepods.slice. May 8 00:53:21.841788 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:53:21.844846 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:53:21.859195 kubelet[1666]: I0508 00:53:21.859160 1666 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:53:21.857000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:21.857000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:21.857000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d80270 a1=c000c0a468 a2=c000d801b0 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:21.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:21.859597 kubelet[1666]: I0508 00:53:21.859239 1666 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:53:21.859597 kubelet[1666]: I0508 00:53:21.859356 1666 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:53:21.859597 kubelet[1666]: I0508 00:53:21.859366 1666 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:53:21.859674 kubelet[1666]: I0508 00:53:21.859619 1666 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:53:21.861026 kubelet[1666]: E0508 00:53:21.860982 1666 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:53:21.961550 kubelet[1666]: I0508 00:53:21.961497 1666 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:21.961872 kubelet[1666]: E0508 00:53:21.961841 1666 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.137:6443/api/v1/nodes\": dial tcp 10.0.0.137:6443: connect: connection refused" node="localhost" May 8 00:53:22.145949 kubelet[1666]: E0508 00:53:22.145903 1666 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.137:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:22.163399 kubelet[1666]: I0508 00:53:22.163336 1666 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:22.163789 kubelet[1666]: E0508 00:53:22.163750 1666 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.137:6443/api/v1/nodes\": dial tcp 10.0.0.137:6443: connect: connection refused" node="localhost" May 8 00:53:22.565911 kubelet[1666]: I0508 00:53:22.565861 1666 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:22.566302 kubelet[1666]: E0508 00:53:22.566263 1666 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.137:6443/api/v1/nodes\": dial tcp 10.0.0.137:6443: connect: connection refused" node="localhost" May 8 00:53:23.137448 kubelet[1666]: W0508 00:53:23.137296 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:23.137448 kubelet[1666]: E0508 00:53:23.137434 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.137:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:23.219821 kubelet[1666]: E0508 00:53:23.219749 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.137:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.137:6443: connect: connection refused" interval="3.2s" May 8 00:53:23.337696 systemd[1]: Created slice kubepods-burstable-pod30af2e352a0dbf65ec618b1e2bb7fcb9.slice. May 8 00:53:23.353181 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 8 00:53:23.359985 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 8 00:53:23.367080 kubelet[1666]: I0508 00:53:23.367062 1666 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:23.367458 kubelet[1666]: E0508 00:53:23.367425 1666 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.137:6443/api/v1/nodes\": dial tcp 10.0.0.137:6443: connect: connection refused" node="localhost" May 8 00:53:23.433453 kubelet[1666]: I0508 00:53:23.432986 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:23.433453 kubelet[1666]: I0508 00:53:23.433042 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:23.433453 kubelet[1666]: I0508 00:53:23.433058 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:23.433453 kubelet[1666]: I0508 00:53:23.433076 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:23.433453 kubelet[1666]: I0508 00:53:23.433091 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 8 00:53:23.433703 kubelet[1666]: I0508 00:53:23.433105 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:23.433703 kubelet[1666]: I0508 00:53:23.433121 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:23.433703 kubelet[1666]: I0508 00:53:23.433164 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:23.433703 kubelet[1666]: I0508 00:53:23.433181 1666 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:23.472684 kubelet[1666]: W0508 00:53:23.472591 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:23.472827 kubelet[1666]: E0508 00:53:23.472700 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.137:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:23.637920 kubelet[1666]: W0508 00:53:23.637811 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:23.638309 kubelet[1666]: E0508 00:53:23.637921 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.137:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:23.651550 kubelet[1666]: E0508 00:53:23.651499 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:23.652305 env[1234]: time="2025-05-08T00:53:23.652252286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:30af2e352a0dbf65ec618b1e2bb7fcb9,Namespace:kube-system,Attempt:0,}" May 8 00:53:23.659531 kubelet[1666]: E0508 00:53:23.659474 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:23.660042 env[1234]: time="2025-05-08T00:53:23.660001228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 8 00:53:23.662277 kubelet[1666]: E0508 00:53:23.662240 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:23.662657 env[1234]: time="2025-05-08T00:53:23.662619281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 8 00:53:23.750312 kubelet[1666]: W0508 00:53:23.750119 1666 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.137:6443: connect: connection refused May 8 00:53:23.750312 kubelet[1666]: E0508 00:53:23.750210 1666 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.137:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.137:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:24.289357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount53370797.mount: Deactivated successfully. May 8 00:53:24.297553 env[1234]: time="2025-05-08T00:53:24.297474242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.298613 env[1234]: time="2025-05-08T00:53:24.298576963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.302490 env[1234]: time="2025-05-08T00:53:24.302456426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.303795 env[1234]: time="2025-05-08T00:53:24.303766187Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.305663 env[1234]: time="2025-05-08T00:53:24.305624805Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.307043 env[1234]: time="2025-05-08T00:53:24.307008667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.308917 env[1234]: time="2025-05-08T00:53:24.308863619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.310173 env[1234]: time="2025-05-08T00:53:24.310138214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.311328 env[1234]: time="2025-05-08T00:53:24.311293324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.312895 env[1234]: time="2025-05-08T00:53:24.312864219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.315068 env[1234]: time="2025-05-08T00:53:24.315037270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.316484 env[1234]: time="2025-05-08T00:53:24.316439027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:24.340864 env[1234]: time="2025-05-08T00:53:24.340784347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:24.340864 env[1234]: time="2025-05-08T00:53:24.340831446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:24.340864 env[1234]: time="2025-05-08T00:53:24.340840994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:24.341096 env[1234]: time="2025-05-08T00:53:24.341007138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d20d1e7a1e4d260027971b61c822edaa417f72ec718ce0d122d04efca081e73 pid=1707 runtime=io.containerd.runc.v2 May 8 00:53:24.355709 env[1234]: time="2025-05-08T00:53:24.355477550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:24.355709 env[1234]: time="2025-05-08T00:53:24.355518938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:24.355709 env[1234]: time="2025-05-08T00:53:24.355531441Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:24.355828 systemd[1]: Started cri-containerd-6d20d1e7a1e4d260027971b61c822edaa417f72ec718ce0d122d04efca081e73.scope. May 8 00:53:24.356155 env[1234]: time="2025-05-08T00:53:24.355796773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:24.356155 env[1234]: time="2025-05-08T00:53:24.355830516Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:24.356155 env[1234]: time="2025-05-08T00:53:24.355844803Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:24.356155 env[1234]: time="2025-05-08T00:53:24.355987983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f654137bbdc6b03bae5e4b2ca7877401888c240a46535d21bb7cafa8fce66fc0 pid=1745 runtime=io.containerd.runc.v2 May 8 00:53:24.356425 env[1234]: time="2025-05-08T00:53:24.356350768Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19252bdcac67677b46b6ad51f1b4a6e4c985a973e6f97a0fe376ffc1e7c78625 pid=1744 runtime=io.containerd.runc.v2 May 8 00:53:24.373568 systemd[1]: Started cri-containerd-f654137bbdc6b03bae5e4b2ca7877401888c240a46535d21bb7cafa8fce66fc0.scope. May 8 00:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.375859 systemd[1]: Started cri-containerd-19252bdcac67677b46b6ad51f1b4a6e4c985a973e6f97a0fe376ffc1e7c78625.scope. May 8 00:53:24.379631 kernel: kauditd_printk_skb: 215 callbacks suppressed May 8 00:53:24.379708 kernel: audit: type=1400 audit(1746665604.376:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.390966 kernel: audit: type=1400 audit(1746665604.376:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.391080 kernel: audit: type=1400 audit(1746665604.376:463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.395461 kernel: audit: type=1400 audit(1746665604.376:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.399821 kernel: audit: type=1400 audit(1746665604.376:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.403983 kernel: audit: type=1400 audit(1746665604.376:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.404038 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410121 kernel: audit: type=1400 audit(1746665604.376:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410169 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:53:24.410210 kernel: audit: backlog limit exceeded May 8 00:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit: BPF prog-id=58 op=LOAD May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323064316537613165346432363030323739373162363163383232 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323064316537613165346432363030323739373162363163383232 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.378000 audit: BPF prog-id=59 op=LOAD May 8 00:53:24.378000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003908d0 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323064316537613165346432363030323739373162363163383232 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.382000 audit: BPF prog-id=60 op=LOAD May 8 00:53:24.382000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000390918 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323064316537613165346432363030323739373162363163383232 May 8 00:53:24.389000 audit: BPF prog-id=60 op=UNLOAD May 8 00:53:24.389000 audit: BPF prog-id=59 op=UNLOAD May 8 00:53:24.389000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit: BPF prog-id=61 op=LOAD May 8 00:53:24.389000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000390d28 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323064316537613165346432363030323739373162363163383232 May 8 00:53:24.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.403000 audit: BPF prog-id=62 op=LOAD May 8 00:53:24.407000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.407000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0004160e0 items=0 ppid=1744 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.408000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.408000 audit: BPF prog-id=67 op=LOAD May 8 00:53:24.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139323532626463616336373637376234366236616435316631623461 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410000 audit: BPF prog-id=68 op=LOAD May 8 00:53:24.410000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000416128 items=0 ppid=1744 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139323532626463616336373637376234366236616435316631623461 May 8 00:53:24.411000 audit: BPF prog-id=68 op=UNLOAD May 8 00:53:24.411000 audit: BPF prog-id=65 op=UNLOAD May 8 00:53:24.411000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.411000 audit: BPF prog-id=69 op=LOAD May 8 00:53:24.411000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000416538 items=0 ppid=1744 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139323532626463616336373637376234366236616435316631623461 May 8 00:53:24.408000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6158 items=0 ppid=1745 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353431333762626463366230336261653565346232636137383737 May 8 00:53:24.424554 env[1234]: time="2025-05-08T00:53:24.424509744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"6d20d1e7a1e4d260027971b61c822edaa417f72ec718ce0d122d04efca081e73\"" May 8 00:53:24.427236 kubelet[1666]: E0508 00:53:24.427199 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:24.429412 env[1234]: time="2025-05-08T00:53:24.429359067Z" level=info msg="CreateContainer within sandbox \"6d20d1e7a1e4d260027971b61c822edaa417f72ec718ce0d122d04efca081e73\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:53:24.442272 env[1234]: time="2025-05-08T00:53:24.441312188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:30af2e352a0dbf65ec618b1e2bb7fcb9,Namespace:kube-system,Attempt:0,} returns sandbox id \"19252bdcac67677b46b6ad51f1b4a6e4c985a973e6f97a0fe376ffc1e7c78625\"" May 8 00:53:24.442782 kubelet[1666]: E0508 00:53:24.442747 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:24.444261 env[1234]: time="2025-05-08T00:53:24.444218694Z" level=info msg="CreateContainer within sandbox \"19252bdcac67677b46b6ad51f1b4a6e4c985a973e6f97a0fe376ffc1e7c78625\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:53:24.446276 env[1234]: time="2025-05-08T00:53:24.446236503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"f654137bbdc6b03bae5e4b2ca7877401888c240a46535d21bb7cafa8fce66fc0\"" May 8 00:53:24.447148 kubelet[1666]: E0508 00:53:24.447123 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:24.448801 env[1234]: time="2025-05-08T00:53:24.448761999Z" level=info msg="CreateContainer within sandbox \"f654137bbdc6b03bae5e4b2ca7877401888c240a46535d21bb7cafa8fce66fc0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:53:24.451765 env[1234]: time="2025-05-08T00:53:24.451718730Z" level=info msg="CreateContainer within sandbox \"6d20d1e7a1e4d260027971b61c822edaa417f72ec718ce0d122d04efca081e73\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"56314e55e4f12f670056b48d025e2ff4afe0c33ace1b3b218683067a9457359b\"" May 8 00:53:24.452409 env[1234]: time="2025-05-08T00:53:24.452359890Z" level=info msg="StartContainer for \"56314e55e4f12f670056b48d025e2ff4afe0c33ace1b3b218683067a9457359b\"" May 8 00:53:24.467764 systemd[1]: Started cri-containerd-56314e55e4f12f670056b48d025e2ff4afe0c33ace1b3b218683067a9457359b.scope. May 8 00:53:24.474538 env[1234]: time="2025-05-08T00:53:24.474469792Z" level=info msg="CreateContainer within sandbox \"19252bdcac67677b46b6ad51f1b4a6e4c985a973e6f97a0fe376ffc1e7c78625\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0a7c90f0857f301c88efc68d4e1ff096a200004408187a7d46568e47e7d4da1a\"" May 8 00:53:24.475029 env[1234]: time="2025-05-08T00:53:24.474956460Z" level=info msg="StartContainer for \"0a7c90f0857f301c88efc68d4e1ff096a200004408187a7d46568e47e7d4da1a\"" May 8 00:53:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit: BPF prog-id=70 op=LOAD May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333134653535653466313266363730303536623438643032356532 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333134653535653466313266363730303536623438643032356532 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit: BPF prog-id=71 op=LOAD May 8 00:53:24.479000 audit[1837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbdc0 items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333134653535653466313266363730303536623438643032356532 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit: BPF prog-id=72 op=LOAD May 8 00:53:24.479000 audit[1837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbe08 items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333134653535653466313266363730303536623438643032356532 May 8 00:53:24.479000 audit: BPF prog-id=72 op=UNLOAD May 8 00:53:24.479000 audit: BPF prog-id=71 op=UNLOAD May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.479000 audit: BPF prog-id=73 op=LOAD May 8 00:53:24.479000 audit[1837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d6218 items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333134653535653466313266363730303536623438643032356532 May 8 00:53:24.482830 env[1234]: time="2025-05-08T00:53:24.481242053Z" level=info msg="CreateContainer within sandbox \"f654137bbdc6b03bae5e4b2ca7877401888c240a46535d21bb7cafa8fce66fc0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"1781209b8889f3a8d948becce034531d67d41dc54bebf3011b6aa735804d7de3\"" May 8 00:53:24.483122 env[1234]: time="2025-05-08T00:53:24.483089190Z" level=info msg="StartContainer for \"1781209b8889f3a8d948becce034531d67d41dc54bebf3011b6aa735804d7de3\"" May 8 00:53:24.491366 systemd[1]: Started cri-containerd-0a7c90f0857f301c88efc68d4e1ff096a200004408187a7d46568e47e7d4da1a.scope. May 8 00:53:24.501148 systemd[1]: Started cri-containerd-1781209b8889f3a8d948becce034531d67d41dc54bebf3011b6aa735804d7de3.scope. May 8 00:53:24.512112 env[1234]: time="2025-05-08T00:53:24.508001471Z" level=info msg="StartContainer for \"56314e55e4f12f670056b48d025e2ff4afe0c33ace1b3b218683067a9457359b\" returns successfully" May 8 00:53:24.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.514000 audit: BPF prog-id=74 op=LOAD May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1744 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061376339306630383537663330316338386566633638643465316666 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1744 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061376339306630383537663330316338386566633638643465316666 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit: BPF prog-id=75 op=LOAD May 8 00:53:24.515000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9bb0 items=0 ppid=1744 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061376339306630383537663330316338386566633638643465316666 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit: BPF prog-id=76 op=LOAD May 8 00:53:24.515000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9bf8 items=0 ppid=1744 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061376339306630383537663330316338386566633638643465316666 May 8 00:53:24.515000 audit: BPF prog-id=76 op=UNLOAD May 8 00:53:24.515000 audit: BPF prog-id=75 op=UNLOAD May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.515000 audit: BPF prog-id=77 op=LOAD May 8 00:53:24.515000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc008 items=0 ppid=1744 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061376339306630383537663330316338386566633638643465316666 May 8 00:53:24.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.517000 audit: BPF prog-id=78 op=LOAD May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383132303962383838396633613864393438626563636530333435 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383132303962383838396633613864393438626563636530333435 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit: BPF prog-id=79 op=LOAD May 8 00:53:24.518000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9d10 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383132303962383838396633613864393438626563636530333435 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit: BPF prog-id=80 op=LOAD May 8 00:53:24.518000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d58 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383132303962383838396633613864393438626563636530333435 May 8 00:53:24.518000 audit: BPF prog-id=80 op=UNLOAD May 8 00:53:24.518000 audit: BPF prog-id=79 op=UNLOAD May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.518000 audit: BPF prog-id=81 op=LOAD May 8 00:53:24.518000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d6168 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383132303962383838396633613864393438626563636530333435 May 8 00:53:24.548422 env[1234]: time="2025-05-08T00:53:24.548289472Z" level=info msg="StartContainer for \"0a7c90f0857f301c88efc68d4e1ff096a200004408187a7d46568e47e7d4da1a\" returns successfully" May 8 00:53:24.561912 env[1234]: time="2025-05-08T00:53:24.561858934Z" level=info msg="StartContainer for \"1781209b8889f3a8d948becce034531d67d41dc54bebf3011b6aa735804d7de3\" returns successfully" May 8 00:53:24.968995 kubelet[1666]: I0508 00:53:24.968847 1666 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:25.022000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.022000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d0e930 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:25.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:25.023000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.023000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d10920 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:25.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:25.240724 kubelet[1666]: E0508 00:53:25.240605 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:25.242408 kubelet[1666]: E0508 00:53:25.242354 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:25.244039 kubelet[1666]: E0508 00:53:25.244022 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:25.518000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.518000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00673a360 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.518000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.521000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.521000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0036b3cb0 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.521000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.523000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.523000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c00673a5c0 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.523000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.523000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c005e70180 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.527000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.527000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=57 a1=c005d96210 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.533000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:25.533000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005cd8000 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:53:25.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:25.641346 kubelet[1666]: I0508 00:53:25.641301 1666 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 8 00:53:25.641346 kubelet[1666]: E0508 00:53:25.641343 1666 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 8 00:53:25.650410 kubelet[1666]: E0508 00:53:25.650336 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:25.750467 kubelet[1666]: E0508 00:53:25.750410 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:25.851297 kubelet[1666]: E0508 00:53:25.851238 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:25.951862 kubelet[1666]: E0508 00:53:25.951803 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.052738 kubelet[1666]: E0508 00:53:26.052676 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.153273 kubelet[1666]: E0508 00:53:26.153127 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.245827 kubelet[1666]: E0508 00:53:26.245779 1666 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:26.253507 kubelet[1666]: E0508 00:53:26.253476 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.354081 kubelet[1666]: E0508 00:53:26.354033 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.454771 kubelet[1666]: E0508 00:53:26.454648 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.555283 kubelet[1666]: E0508 00:53:26.555237 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.656226 kubelet[1666]: E0508 00:53:26.656180 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.757259 kubelet[1666]: E0508 00:53:26.757124 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.857710 kubelet[1666]: E0508 00:53:26.857653 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:26.958285 kubelet[1666]: E0508 00:53:26.958247 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.058807 kubelet[1666]: E0508 00:53:27.058769 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.159564 kubelet[1666]: E0508 00:53:27.159521 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.259819 kubelet[1666]: E0508 00:53:27.259760 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.360982 kubelet[1666]: E0508 00:53:27.360840 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.461501 kubelet[1666]: E0508 00:53:27.461442 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.562110 kubelet[1666]: E0508 00:53:27.562054 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.663259 kubelet[1666]: E0508 00:53:27.663110 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.764132 kubelet[1666]: E0508 00:53:27.764080 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.864923 kubelet[1666]: E0508 00:53:27.864855 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:27.965569 kubelet[1666]: E0508 00:53:27.965415 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.066078 kubelet[1666]: E0508 00:53:28.066020 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.166791 kubelet[1666]: E0508 00:53:28.166737 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.267204 kubelet[1666]: E0508 00:53:28.267058 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.367794 kubelet[1666]: E0508 00:53:28.367727 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.432706 systemd[1]: Reloading. May 8 00:53:28.468329 kubelet[1666]: E0508 00:53:28.468285 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.499725 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2025-05-08T00:53:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:53:28.499774 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2025-05-08T00:53:28Z" level=info msg="torcx already run" May 8 00:53:28.562532 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:53:28.562552 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:53:28.569124 kubelet[1666]: E0508 00:53:28.569091 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.580207 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit: BPF prog-id=82 op=LOAD May 8 00:53:28.648000 audit: BPF prog-id=43 op=UNLOAD May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit: BPF prog-id=83 op=LOAD May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.648000 audit: BPF prog-id=84 op=LOAD May 8 00:53:28.648000 audit: BPF prog-id=44 op=UNLOAD May 8 00:53:28.648000 audit: BPF prog-id=45 op=UNLOAD May 8 00:53:28.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.649000 audit: BPF prog-id=85 op=LOAD May 8 00:53:28.649000 audit: BPF prog-id=46 op=UNLOAD May 8 00:53:28.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.650000 audit: BPF prog-id=86 op=LOAD May 8 00:53:28.650000 audit: BPF prog-id=78 op=UNLOAD May 8 00:53:28.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.652000 audit: BPF prog-id=87 op=LOAD May 8 00:53:28.652000 audit: BPF prog-id=74 op=UNLOAD May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit: BPF prog-id=88 op=LOAD May 8 00:53:28.653000 audit: BPF prog-id=62 op=UNLOAD May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.653000 audit: BPF prog-id=89 op=LOAD May 8 00:53:28.653000 audit: BPF prog-id=58 op=UNLOAD May 8 00:53:28.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.654000 audit: BPF prog-id=90 op=LOAD May 8 00:53:28.654000 audit: BPF prog-id=47 op=UNLOAD May 8 00:53:28.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.656000 audit: BPF prog-id=91 op=LOAD May 8 00:53:28.656000 audit: BPF prog-id=64 op=UNLOAD May 8 00:53:28.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.657000 audit: BPF prog-id=92 op=LOAD May 8 00:53:28.657000 audit: BPF prog-id=48 op=UNLOAD May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit: BPF prog-id=93 op=LOAD May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.658000 audit: BPF prog-id=94 op=LOAD May 8 00:53:28.658000 audit: BPF prog-id=49 op=UNLOAD May 8 00:53:28.658000 audit: BPF prog-id=50 op=UNLOAD May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit: BPF prog-id=95 op=LOAD May 8 00:53:28.659000 audit: BPF prog-id=51 op=UNLOAD May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.660000 audit: BPF prog-id=96 op=LOAD May 8 00:53:28.660000 audit: BPF prog-id=52 op=UNLOAD May 8 00:53:28.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit: BPF prog-id=97 op=LOAD May 8 00:53:28.662000 audit: BPF prog-id=53 op=UNLOAD May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit: BPF prog-id=98 op=LOAD May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit: BPF prog-id=99 op=LOAD May 8 00:53:28.662000 audit: BPF prog-id=54 op=UNLOAD May 8 00:53:28.662000 audit: BPF prog-id=55 op=UNLOAD May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit: BPF prog-id=100 op=LOAD May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit: BPF prog-id=101 op=LOAD May 8 00:53:28.663000 audit: BPF prog-id=56 op=UNLOAD May 8 00:53:28.663000 audit: BPF prog-id=57 op=UNLOAD May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.663000 audit: BPF prog-id=102 op=LOAD May 8 00:53:28.663000 audit: BPF prog-id=70 op=UNLOAD May 8 00:53:28.669938 kubelet[1666]: E0508 00:53:28.669905 1666 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.674752 systemd[1]: Stopping kubelet.service... May 8 00:53:28.698721 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:53:28.698879 systemd[1]: Stopped kubelet.service. May 8 00:53:28.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:28.698929 systemd[1]: kubelet.service: Consumed 1.019s CPU time. May 8 00:53:28.700668 systemd[1]: Starting kubelet.service... May 8 00:53:28.777540 systemd[1]: Started kubelet.service. May 8 00:53:28.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:28.814207 kubelet[2015]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:28.814207 kubelet[2015]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:53:28.814207 kubelet[2015]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:28.814207 kubelet[2015]: I0508 00:53:28.814143 2015 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:53:28.823500 kubelet[2015]: I0508 00:53:28.823445 2015 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 8 00:53:28.823500 kubelet[2015]: I0508 00:53:28.823485 2015 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:53:28.823909 kubelet[2015]: I0508 00:53:28.823870 2015 server.go:929] "Client rotation is on, will bootstrap in background" May 8 00:53:28.825203 kubelet[2015]: I0508 00:53:28.825174 2015 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:53:28.827180 kubelet[2015]: I0508 00:53:28.827139 2015 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:53:28.835959 kubelet[2015]: E0508 00:53:28.835909 2015 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:53:28.835959 kubelet[2015]: I0508 00:53:28.835950 2015 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:53:28.844429 kubelet[2015]: I0508 00:53:28.839712 2015 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:53:28.844429 kubelet[2015]: I0508 00:53:28.839817 2015 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 8 00:53:28.844429 kubelet[2015]: I0508 00:53:28.839913 2015 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:53:28.844429 kubelet[2015]: I0508 00:53:28.839944 2015 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840113 2015 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840122 2015 container_manager_linux.go:300] "Creating device plugin manager" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840155 2015 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840256 2015 kubelet.go:408] "Attempting to sync node with API server" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840266 2015 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840291 2015 kubelet.go:314] "Adding apiserver pod source" May 8 00:53:28.845204 kubelet[2015]: I0508 00:53:28.840303 2015 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:53:28.846154 kubelet[2015]: I0508 00:53:28.846121 2015 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:53:28.846619 kubelet[2015]: I0508 00:53:28.846592 2015 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:53:28.847055 kubelet[2015]: I0508 00:53:28.847027 2015 server.go:1269] "Started kubelet" May 8 00:53:28.848000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.848000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:28.848000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000db2120 a1=c000cac7e0 a2=c000db20f0 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:28.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:28.848000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.848000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:28.848000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb7c20 a1=c000cac7f8 a2=c000db21b0 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:28.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.848616 2015 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.848891 2015 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.848942 2015 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.849499 2015 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.849552 2015 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.849578 2015 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.850459 2015 server.go:460] "Adding debug handlers to kubelet server" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.852960 2015 volume_manager.go:289] "Starting Kubelet Volume Manager" May 8 00:53:28.853724 kubelet[2015]: E0508 00:53:28.853101 2015 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:28.853724 kubelet[2015]: I0508 00:53:28.853579 2015 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 8 00:53:28.854045 kubelet[2015]: I0508 00:53:28.853749 2015 reconciler.go:26] "Reconciler: start to sync state" May 8 00:53:28.856762 kubelet[2015]: E0508 00:53:28.856744 2015 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:53:28.856889 kubelet[2015]: I0508 00:53:28.856807 2015 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:53:28.858052 kubelet[2015]: I0508 00:53:28.857436 2015 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:53:28.859506 kubelet[2015]: I0508 00:53:28.859490 2015 factory.go:221] Registration of the containerd container factory successfully May 8 00:53:28.859657 kubelet[2015]: I0508 00:53:28.859640 2015 factory.go:221] Registration of the systemd container factory successfully May 8 00:53:28.866621 kubelet[2015]: I0508 00:53:28.866536 2015 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:53:28.867861 kubelet[2015]: I0508 00:53:28.867825 2015 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:53:28.867963 kubelet[2015]: I0508 00:53:28.867898 2015 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:53:28.867963 kubelet[2015]: I0508 00:53:28.867923 2015 kubelet.go:2321] "Starting kubelet main sync loop" May 8 00:53:28.868040 kubelet[2015]: E0508 00:53:28.867967 2015 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:53:28.891702 kubelet[2015]: I0508 00:53:28.891663 2015 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:53:28.891702 kubelet[2015]: I0508 00:53:28.891693 2015 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:53:28.891920 kubelet[2015]: I0508 00:53:28.891720 2015 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:28.891920 kubelet[2015]: I0508 00:53:28.891897 2015 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:53:28.892000 kubelet[2015]: I0508 00:53:28.891911 2015 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:53:28.892000 kubelet[2015]: I0508 00:53:28.891932 2015 policy_none.go:49] "None policy: Start" May 8 00:53:28.892618 kubelet[2015]: I0508 00:53:28.892604 2015 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:53:28.892618 kubelet[2015]: I0508 00:53:28.892622 2015 state_mem.go:35] "Initializing new in-memory state store" May 8 00:53:28.892772 kubelet[2015]: I0508 00:53:28.892757 2015 state_mem.go:75] "Updated machine memory state" May 8 00:53:28.896548 kubelet[2015]: I0508 00:53:28.896531 2015 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:53:28.895000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:28.895000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:28.895000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c84870 a1=c001138e88 a2=c000c84840 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:28.895000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:28.896891 kubelet[2015]: I0508 00:53:28.896678 2015 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:53:28.896891 kubelet[2015]: I0508 00:53:28.896827 2015 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:53:28.896891 kubelet[2015]: I0508 00:53:28.896840 2015 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:53:28.898805 kubelet[2015]: I0508 00:53:28.898777 2015 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:53:29.002530 kubelet[2015]: I0508 00:53:29.002470 2015 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:29.009732 kubelet[2015]: I0508 00:53:29.009703 2015 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 8 00:53:29.009893 kubelet[2015]: I0508 00:53:29.009784 2015 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 8 00:53:29.054761 kubelet[2015]: I0508 00:53:29.054713 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:29.054761 kubelet[2015]: I0508 00:53:29.054750 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:29.054761 kubelet[2015]: I0508 00:53:29.054769 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:29.055002 kubelet[2015]: I0508 00:53:29.054784 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 8 00:53:29.055002 kubelet[2015]: I0508 00:53:29.054798 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/30af2e352a0dbf65ec618b1e2bb7fcb9-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"30af2e352a0dbf65ec618b1e2bb7fcb9\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:29.055002 kubelet[2015]: I0508 00:53:29.054810 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:29.055002 kubelet[2015]: I0508 00:53:29.054823 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:29.055002 kubelet[2015]: I0508 00:53:29.054840 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:29.055136 kubelet[2015]: I0508 00:53:29.054857 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:29.179000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:29.179000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00065d480 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:29.179000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:29.180000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:29.180000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d116a0 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:29.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:29.182000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:29.182000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00065d500 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:29.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:29.182000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:29.182000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d11860 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:29.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:29.277434 kubelet[2015]: E0508 00:53:29.277400 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:29.277590 kubelet[2015]: E0508 00:53:29.277458 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:29.277590 kubelet[2015]: E0508 00:53:29.277534 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:29.840952 kubelet[2015]: I0508 00:53:29.840897 2015 apiserver.go:52] "Watching apiserver" May 8 00:53:29.854221 kubelet[2015]: I0508 00:53:29.854193 2015 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 8 00:53:29.881361 kubelet[2015]: E0508 00:53:29.879049 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:29.881361 kubelet[2015]: E0508 00:53:29.879198 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:30.015517 kubelet[2015]: I0508 00:53:30.015443 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.015398308 podStartE2EDuration="2.015398308s" podCreationTimestamp="2025-05-08 00:53:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:30.015173455 +0000 UTC m=+1.233522667" watchObservedRunningTime="2025-05-08 00:53:30.015398308 +0000 UTC m=+1.233747550" May 8 00:53:30.016513 kubelet[2015]: E0508 00:53:30.016487 2015 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:53:30.016747 kubelet[2015]: E0508 00:53:30.016712 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:30.191000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:53:30.194102 kernel: kauditd_printk_skb: 730 callbacks suppressed May 8 00:53:30.194161 kernel: audit: type=1400 audit(1746665610.191:810): avc: denied { watch } for pid=1847 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:53:30.191000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000656040 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:30.203748 kernel: audit: type=1300 audit(1746665610.191:810): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000656040 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:53:30.203799 kernel: audit: type=1327 audit(1746665610.191:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:30.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:30.476224 kubelet[2015]: I0508 00:53:30.476090 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.476068203 podStartE2EDuration="2.476068203s" podCreationTimestamp="2025-05-08 00:53:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:30.168664843 +0000 UTC m=+1.387014055" watchObservedRunningTime="2025-05-08 00:53:30.476068203 +0000 UTC m=+1.694417415" May 8 00:53:30.525898 kubelet[2015]: I0508 00:53:30.525814 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.525790314 podStartE2EDuration="2.525790314s" podCreationTimestamp="2025-05-08 00:53:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:30.476854754 +0000 UTC m=+1.695203966" watchObservedRunningTime="2025-05-08 00:53:30.525790314 +0000 UTC m=+1.744139546" May 8 00:53:30.880347 kubelet[2015]: E0508 00:53:30.880299 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:33.716228 kubelet[2015]: I0508 00:53:33.716185 2015 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:53:33.716822 env[1234]: time="2025-05-08T00:53:33.716779823Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:53:33.717100 kubelet[2015]: I0508 00:53:33.716971 2015 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:53:33.737745 kubelet[2015]: E0508 00:53:33.737688 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:34.275798 systemd[1]: Created slice kubepods-besteffort-pod9c9ed07a_c066_4fbd_856b_f824afa43d1b.slice. May 8 00:53:34.288681 kubelet[2015]: I0508 00:53:34.288633 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hzjqc\" (UniqueName: \"kubernetes.io/projected/9c9ed07a-c066-4fbd-856b-f824afa43d1b-kube-api-access-hzjqc\") pod \"kube-proxy-hgsxz\" (UID: \"9c9ed07a-c066-4fbd-856b-f824afa43d1b\") " pod="kube-system/kube-proxy-hgsxz" May 8 00:53:34.288860 kubelet[2015]: I0508 00:53:34.288684 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9c9ed07a-c066-4fbd-856b-f824afa43d1b-kube-proxy\") pod \"kube-proxy-hgsxz\" (UID: \"9c9ed07a-c066-4fbd-856b-f824afa43d1b\") " pod="kube-system/kube-proxy-hgsxz" May 8 00:53:34.288860 kubelet[2015]: I0508 00:53:34.288714 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9c9ed07a-c066-4fbd-856b-f824afa43d1b-xtables-lock\") pod \"kube-proxy-hgsxz\" (UID: \"9c9ed07a-c066-4fbd-856b-f824afa43d1b\") " pod="kube-system/kube-proxy-hgsxz" May 8 00:53:34.288860 kubelet[2015]: I0508 00:53:34.288732 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9c9ed07a-c066-4fbd-856b-f824afa43d1b-lib-modules\") pod \"kube-proxy-hgsxz\" (UID: \"9c9ed07a-c066-4fbd-856b-f824afa43d1b\") " pod="kube-system/kube-proxy-hgsxz" May 8 00:53:34.394129 kubelet[2015]: I0508 00:53:34.394078 2015 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:53:34.585618 kubelet[2015]: E0508 00:53:34.585576 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:34.586651 env[1234]: time="2025-05-08T00:53:34.586607560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hgsxz,Uid:9c9ed07a-c066-4fbd-856b-f824afa43d1b,Namespace:kube-system,Attempt:0,}" May 8 00:53:35.021828 env[1234]: time="2025-05-08T00:53:35.021632312Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:35.021828 env[1234]: time="2025-05-08T00:53:35.021672066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:35.021828 env[1234]: time="2025-05-08T00:53:35.021691162Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:35.022271 env[1234]: time="2025-05-08T00:53:35.021880358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504 pid=2108 runtime=io.containerd.runc.v2 May 8 00:53:35.037848 sudo[1362]: pam_unix(sudo:session): session closed for user root May 8 00:53:35.047410 kernel: audit: type=1106 audit(1746665615.036:811): pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:35.047494 kernel: audit: type=1104 audit(1746665615.036:812): pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:35.036000 audit[1362]: USER_END pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:35.036000 audit[1362]: CRED_DISP pid=1362 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:35.045771 systemd[1]: run-containerd-runc-k8s.io-1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504-runc.PQrW8f.mount: Deactivated successfully. May 8 00:53:35.047521 systemd[1]: Started cri-containerd-1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504.scope. May 8 00:53:35.048155 sshd[1359]: pam_unix(sshd:session): session closed for user core May 8 00:53:35.056000 audit[1359]: USER_END pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:35.059474 systemd[1]: sshd@6-10.0.0.137:22-10.0.0.1:43418.service: Deactivated successfully. May 8 00:53:35.060184 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:53:35.060352 systemd[1]: session-7.scope: Consumed 4.262s CPU time. May 8 00:53:35.060969 systemd-logind[1220]: Session 7 logged out. Waiting for processes to exit. May 8 00:53:35.062546 systemd-logind[1220]: Removed session 7. May 8 00:53:35.056000 audit[1359]: CRED_DISP pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:35.070464 kernel: audit: type=1106 audit(1746665615.056:813): pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:35.070580 kernel: audit: type=1104 audit(1746665615.056:814): pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:35.070600 kernel: audit: type=1131 audit(1746665615.058:815): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:35.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:35.074113 kernel: audit: type=1400 audit(1746665615.066:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.077588 kernel: audit: type=1400 audit(1746665615.066:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit: BPF prog-id=103 op=LOAD May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2108 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164396237633862316663353431613538373064323964363363616563 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2108 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164396237633862316663353431613538373064323964363363616563 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.069000 audit: BPF prog-id=104 op=LOAD May 8 00:53:35.069000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a09d0 items=0 ppid=2108 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164396237633862316663353431613538373064323964363363616563 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit: BPF prog-id=105 op=LOAD May 8 00:53:35.072000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0a18 items=0 ppid=2108 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164396237633862316663353431613538373064323964363363616563 May 8 00:53:35.072000 audit: BPF prog-id=105 op=UNLOAD May 8 00:53:35.072000 audit: BPF prog-id=104 op=UNLOAD May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.072000 audit: BPF prog-id=106 op=LOAD May 8 00:53:35.072000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0e28 items=0 ppid=2108 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164396237633862316663353431613538373064323964363363616563 May 8 00:53:35.088082 env[1234]: time="2025-05-08T00:53:35.088036640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hgsxz,Uid:9c9ed07a-c066-4fbd-856b-f824afa43d1b,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504\"" May 8 00:53:35.088758 kubelet[2015]: E0508 00:53:35.088724 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:35.091141 env[1234]: time="2025-05-08T00:53:35.091100134Z" level=info msg="CreateContainer within sandbox \"1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:53:35.125409 systemd[1]: Created slice kubepods-besteffort-pod8a2ebca3_0f1c_412d_be60_566b9f104885.slice. May 8 00:53:35.179401 env[1234]: time="2025-05-08T00:53:35.179328614Z" level=info msg="CreateContainer within sandbox \"1d9b7c8b1fc541a5870d29d63caec44a246896e34cf001e631d6f98377ec1504\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"334cabb86c57d662ded512533d4ec12e87630fa48c32c7ac09f2fb3be599499c\"" May 8 00:53:35.180003 env[1234]: time="2025-05-08T00:53:35.179934645Z" level=info msg="StartContainer for \"334cabb86c57d662ded512533d4ec12e87630fa48c32c7ac09f2fb3be599499c\"" May 8 00:53:35.194522 kubelet[2015]: I0508 00:53:35.194361 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ps6xl\" (UniqueName: \"kubernetes.io/projected/8a2ebca3-0f1c-412d-be60-566b9f104885-kube-api-access-ps6xl\") pod \"tigera-operator-6f6897fdc5-8cjx7\" (UID: \"8a2ebca3-0f1c-412d-be60-566b9f104885\") " pod="tigera-operator/tigera-operator-6f6897fdc5-8cjx7" May 8 00:53:35.194522 kubelet[2015]: I0508 00:53:35.194444 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8a2ebca3-0f1c-412d-be60-566b9f104885-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-8cjx7\" (UID: \"8a2ebca3-0f1c-412d-be60-566b9f104885\") " pod="tigera-operator/tigera-operator-6f6897fdc5-8cjx7" May 8 00:53:35.194743 systemd[1]: Started cri-containerd-334cabb86c57d662ded512533d4ec12e87630fa48c32c7ac09f2fb3be599499c.scope. May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.210401 kernel: kauditd_printk_skb: 55 callbacks suppressed May 8 00:53:35.210461 kernel: audit: type=1400 audit(1746665615.208:834): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f86c0d7e3b8 items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.218647 kernel: audit: type=1300 audit(1746665615.208:834): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f86c0d7e3b8 items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.218714 kernel: audit: type=1327 audit(1746665615.208:834): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346361626238366335376436363264656435313235333364346563 May 8 00:53:35.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346361626238366335376436363264656435313235333364346563 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.225907 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.225954 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.232045 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.232149 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.239103 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.239169 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.245740 kernel: audit: type=1400 audit(1746665615.208:835): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.208000 audit: BPF prog-id=107 op=LOAD May 8 00:53:35.208000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a2af8 items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346361626238366335376436363264656435313235333364346563 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.212000 audit: BPF prog-id=108 op=LOAD May 8 00:53:35.212000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a2b48 items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346361626238366335376436363264656435313235333364346563 May 8 00:53:35.221000 audit: BPF prog-id=108 op=UNLOAD May 8 00:53:35.221000 audit: BPF prog-id=107 op=UNLOAD May 8 00:53:35.221000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.221000 audit: BPF prog-id=109 op=LOAD May 8 00:53:35.221000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a2bd8 items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346361626238366335376436363264656435313235333364346563 May 8 00:53:35.249925 env[1234]: time="2025-05-08T00:53:35.249877521Z" level=info msg="StartContainer for \"334cabb86c57d662ded512533d4ec12e87630fa48c32c7ac09f2fb3be599499c\" returns successfully" May 8 00:53:35.343000 audit[2212]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.343000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4ac4af50 a2=0 a3=7ffc4ac4af3c items=0 ppid=2160 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:53:35.344000 audit[2213]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.344000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2c7d3db0 a2=0 a3=7fff2c7d3d9c items=0 ppid=2160 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:53:35.344000 audit[2214]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.344000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef541c300 a2=0 a3=7ffef541c2ec items=0 ppid=2160 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:53:35.345000 audit[2215]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.345000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd2bb2390 a2=0 a3=7fffd2bb237c items=0 ppid=2160 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:53:35.345000 audit[2216]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.345000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbad7fed0 a2=0 a3=7ffdbad7febc items=0 ppid=2160 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:53:35.346000 audit[2217]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.346000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeecf4ed50 a2=0 a3=7ffeecf4ed3c items=0 ppid=2160 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:53:35.428733 env[1234]: time="2025-05-08T00:53:35.428670837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-8cjx7,Uid:8a2ebca3-0f1c-412d-be60-566b9f104885,Namespace:tigera-operator,Attempt:0,}" May 8 00:53:35.446205 env[1234]: time="2025-05-08T00:53:35.446128704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:35.446205 env[1234]: time="2025-05-08T00:53:35.446168779Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:35.446205 env[1234]: time="2025-05-08T00:53:35.446183348Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:35.446411 env[1234]: time="2025-05-08T00:53:35.446296660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b pid=2225 runtime=io.containerd.runc.v2 May 8 00:53:35.448000 audit[2237]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.448000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffefe91eec0 a2=0 a3=7ffefe91eeac items=0 ppid=2160 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:53:35.454000 audit[2245]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.454000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffec0bec4a0 a2=0 a3=7ffec0bec48c items=0 ppid=2160 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:53:35.459831 systemd[1]: run-containerd-runc-k8s.io-9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b-runc.yac7mm.mount: Deactivated successfully. May 8 00:53:35.457000 audit[2248]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.457000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3624aa90 a2=0 a3=7ffd3624aa7c items=0 ppid=2160 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:53:35.458000 audit[2249]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.458000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdea75b3d0 a2=0 a3=7ffdea75b3bc items=0 ppid=2160 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:53:35.461343 systemd[1]: Started cri-containerd-9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b.scope. May 8 00:53:35.461000 audit[2251]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.461000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd30041f20 a2=0 a3=7ffd30041f0c items=0 ppid=2160 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:53:35.462000 audit[2252]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.462000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6ca1bb00 a2=0 a3=7ffd6ca1baec items=0 ppid=2160 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:53:35.465000 audit[2254]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.465000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc68d2aaa0 a2=0 a3=7ffc68d2aa8c items=0 ppid=2160 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:53:35.469000 audit[2264]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.469000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeaf528dd0 a2=0 a3=7ffeaf528dbc items=0 ppid=2160 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:53:35.470000 audit[2265]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.470000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe236a3a10 a2=0 a3=7ffe236a39fc items=0 ppid=2160 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:53:35.472000 audit[2267]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.472000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeba2b4190 a2=0 a3=7ffeba2b417c items=0 ppid=2160 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:53:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.473000 audit[2268]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.473000 audit: BPF prog-id=110 op=LOAD May 8 00:53:35.473000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde3415550 a2=0 a3=7ffde341553c items=0 ppid=2160 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353738626330653862656239353534353633303231623031636462 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353738626330653862656239353534353633303231623031636462 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit: BPF prog-id=111 op=LOAD May 8 00:53:35.474000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022e390 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353738626330653862656239353534353633303231623031636462 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit: BPF prog-id=112 op=LOAD May 8 00:53:35.474000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022e3d8 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353738626330653862656239353534353633303231623031636462 May 8 00:53:35.474000 audit: BPF prog-id=112 op=UNLOAD May 8 00:53:35.474000 audit: BPF prog-id=111 op=UNLOAD May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:35.474000 audit: BPF prog-id=113 op=LOAD May 8 00:53:35.474000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022e7e8 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353738626330653862656239353534353633303231623031636462 May 8 00:53:35.476000 audit[2270]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.476000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff50ce0c60 a2=0 a3=7fff50ce0c4c items=0 ppid=2160 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:35.479000 audit[2273]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.479000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed36dd380 a2=0 a3=7ffed36dd36c items=0 ppid=2160 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:35.482000 audit[2276]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.482000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff436e8ea0 a2=0 a3=7fff436e8e8c items=0 ppid=2160 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:53:35.483000 audit[2277]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.483000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0889a270 a2=0 a3=7ffe0889a25c items=0 ppid=2160 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:53:35.485000 audit[2279]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.485000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffeb75c640 a2=0 a3=7fffeb75c62c items=0 ppid=2160 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:35.489000 audit[2282]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.489000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7ca67570 a2=0 a3=7ffc7ca6755c items=0 ppid=2160 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:35.490000 audit[2284]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.490000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2b811e50 a2=0 a3=7ffe2b811e3c items=0 ppid=2160 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:53:35.493000 audit[2290]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:35.493000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe50406770 a2=0 a3=7ffe5040675c items=0 ppid=2160 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:53:35.499075 env[1234]: time="2025-05-08T00:53:35.499022072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-8cjx7,Uid:8a2ebca3-0f1c-412d-be60-566b9f104885,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b\"" May 8 00:53:35.501439 env[1234]: time="2025-05-08T00:53:35.501400758Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:53:35.516000 audit[2299]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:35.516000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc8426920 a2=0 a3=7ffcc842690c items=0 ppid=2160 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:35.525000 audit[2299]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:35.525000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcc8426920 a2=0 a3=7ffcc842690c items=0 ppid=2160 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:35.527000 audit[2304]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.527000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4ed4c5a0 a2=0 a3=7ffc4ed4c58c items=0 ppid=2160 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:53:35.529000 audit[2306]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.529000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce0b6def0 a2=0 a3=7ffce0b6dedc items=0 ppid=2160 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:53:35.532000 audit[2309]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.532000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd907075e0 a2=0 a3=7ffd907075cc items=0 ppid=2160 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:53:35.533000 audit[2310]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.533000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff717a09b0 a2=0 a3=7fff717a099c items=0 ppid=2160 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:53:35.536000 audit[2312]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.536000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdebc0e800 a2=0 a3=7ffdebc0e7ec items=0 ppid=2160 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:53:35.537000 audit[2313]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.537000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9e738a50 a2=0 a3=7fff9e738a3c items=0 ppid=2160 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:53:35.539000 audit[2315]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.539000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc60cf2cc0 a2=0 a3=7ffc60cf2cac items=0 ppid=2160 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:53:35.542000 audit[2318]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.542000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff1678b700 a2=0 a3=7fff1678b6ec items=0 ppid=2160 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:53:35.544000 audit[2319]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.544000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee6367300 a2=0 a3=7ffee63672ec items=0 ppid=2160 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:53:35.546000 audit[2321]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.546000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff24972080 a2=0 a3=7fff2497206c items=0 ppid=2160 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:53:35.547000 audit[2322]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.547000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2c9a4980 a2=0 a3=7ffc2c9a496c items=0 ppid=2160 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:53:35.549000 audit[2324]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.549000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf02c1130 a2=0 a3=7ffdf02c111c items=0 ppid=2160 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:35.552000 audit[2327]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.552000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8517df80 a2=0 a3=7ffd8517df6c items=0 ppid=2160 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:53:35.556000 audit[2330]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.556000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3ce9d470 a2=0 a3=7fff3ce9d45c items=0 ppid=2160 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:53:35.556000 audit[2331]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.556000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff9f72b30 a2=0 a3=7ffff9f72b1c items=0 ppid=2160 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:53:35.559000 audit[2333]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.559000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffea86394c0 a2=0 a3=7ffea86394ac items=0 ppid=2160 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:35.561000 audit[2336]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.561000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd5d327410 a2=0 a3=7ffd5d3273fc items=0 ppid=2160 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:35.562000 audit[2337]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.562000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc19c051e0 a2=0 a3=7ffc19c051cc items=0 ppid=2160 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:53:35.565000 audit[2339]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.565000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffccc489730 a2=0 a3=7ffccc48971c items=0 ppid=2160 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:53:35.566000 audit[2340]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.566000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe76826710 a2=0 a3=7ffe768266fc items=0 ppid=2160 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:53:35.568000 audit[2342]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.568000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe373c3b20 a2=0 a3=7ffe373c3b0c items=0 ppid=2160 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:35.571000 audit[2345]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:35.571000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4e0fe0a0 a2=0 a3=7ffc4e0fe08c items=0 ppid=2160 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:35.573000 audit[2347]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:53:35.573000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdd88db350 a2=0 a3=7ffdd88db33c items=0 ppid=2160 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.573000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:35.574000 audit[2347]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:53:35.574000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd88db350 a2=0 a3=7ffdd88db33c items=0 ppid=2160 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:35.574000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:35.889089 kubelet[2015]: E0508 00:53:35.889052 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:36.016911 kubelet[2015]: E0508 00:53:36.016850 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:36.029439 kubelet[2015]: I0508 00:53:36.029174 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hgsxz" podStartSLOduration=2.029152433 podStartE2EDuration="2.029152433s" podCreationTimestamp="2025-05-08 00:53:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:35.89754191 +0000 UTC m=+7.115891112" watchObservedRunningTime="2025-05-08 00:53:36.029152433 +0000 UTC m=+7.247501645" May 8 00:53:36.890730 kubelet[2015]: E0508 00:53:36.890682 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:37.111877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560338046.mount: Deactivated successfully. May 8 00:53:38.002992 kubelet[2015]: E0508 00:53:38.002946 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:38.365546 env[1234]: time="2025-05-08T00:53:38.365477872Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.371816 env[1234]: time="2025-05-08T00:53:38.371759063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.373482 env[1234]: time="2025-05-08T00:53:38.373446316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.375610 env[1234]: time="2025-05-08T00:53:38.375573586Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.376057 env[1234]: time="2025-05-08T00:53:38.376023131Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 8 00:53:38.378280 env[1234]: time="2025-05-08T00:53:38.378239700Z" level=info msg="CreateContainer within sandbox \"9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:53:38.391599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1423122479.mount: Deactivated successfully. May 8 00:53:38.393403 env[1234]: time="2025-05-08T00:53:38.393338844Z" level=info msg="CreateContainer within sandbox \"9e578bc0e8beb9554563021b01cdb1906f2c874f454758c46971f6a23c1fa66b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3d55491468a2a554146688957b7a53d039d5f2e3710f6c56fbb89a96ac76466f\"" May 8 00:53:38.393926 env[1234]: time="2025-05-08T00:53:38.393883768Z" level=info msg="StartContainer for \"3d55491468a2a554146688957b7a53d039d5f2e3710f6c56fbb89a96ac76466f\"" May 8 00:53:38.410192 systemd[1]: Started cri-containerd-3d55491468a2a554146688957b7a53d039d5f2e3710f6c56fbb89a96ac76466f.scope. May 8 00:53:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit: BPF prog-id=114 op=LOAD May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2225 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353534393134363861326135353431343636383839353762376135 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2225 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353534393134363861326135353431343636383839353762376135 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit: BPF prog-id=115 op=LOAD May 8 00:53:38.421000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000296680 items=0 ppid=2225 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353534393134363861326135353431343636383839353762376135 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.421000 audit: BPF prog-id=116 op=LOAD May 8 00:53:38.421000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002966c8 items=0 ppid=2225 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353534393134363861326135353431343636383839353762376135 May 8 00:53:38.421000 audit: BPF prog-id=116 op=UNLOAD May 8 00:53:38.422000 audit: BPF prog-id=115 op=UNLOAD May 8 00:53:38.422000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.422000 audit: BPF prog-id=117 op=LOAD May 8 00:53:38.422000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000296ad8 items=0 ppid=2225 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353534393134363861326135353431343636383839353762376135 May 8 00:53:38.438572 env[1234]: time="2025-05-08T00:53:38.438504747Z" level=info msg="StartContainer for \"3d55491468a2a554146688957b7a53d039d5f2e3710f6c56fbb89a96ac76466f\" returns successfully" May 8 00:53:38.894192 kubelet[2015]: E0508 00:53:38.894144 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:38.913545 kubelet[2015]: I0508 00:53:38.913465 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-8cjx7" podStartSLOduration=1.036926756 podStartE2EDuration="3.913446208s" podCreationTimestamp="2025-05-08 00:53:35 +0000 UTC" firstStartedPulling="2025-05-08 00:53:35.500499963 +0000 UTC m=+6.718849175" lastFinishedPulling="2025-05-08 00:53:38.377019415 +0000 UTC m=+9.595368627" observedRunningTime="2025-05-08 00:53:38.91315994 +0000 UTC m=+10.131509152" watchObservedRunningTime="2025-05-08 00:53:38.913446208 +0000 UTC m=+10.131795450" May 8 00:53:41.127000 audit[2389]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.129704 kernel: kauditd_printk_skb: 300 callbacks suppressed May 8 00:53:41.129764 kernel: audit: type=1325 audit(1746665621.127:927): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.127000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcedca46b0 a2=0 a3=7ffcedca469c items=0 ppid=2160 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.136735 kernel: audit: type=1300 audit(1746665621.127:927): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcedca46b0 a2=0 a3=7ffcedca469c items=0 ppid=2160 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.136781 kernel: audit: type=1327 audit(1746665621.127:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.139000 audit[2389]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.139000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcedca46b0 a2=0 a3=0 items=0 ppid=2160 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.147976 kernel: audit: type=1325 audit(1746665621.139:928): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.148036 kernel: audit: type=1300 audit(1746665621.139:928): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcedca46b0 a2=0 a3=0 items=0 ppid=2160 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.148059 kernel: audit: type=1327 audit(1746665621.139:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.154000 audit[2391]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.154000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc243f6fa0 a2=0 a3=7ffc243f6f8c items=0 ppid=2160 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.163842 kernel: audit: type=1325 audit(1746665621.154:929): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.163999 kernel: audit: type=1300 audit(1746665621.154:929): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc243f6fa0 a2=0 a3=7ffc243f6f8c items=0 ppid=2160 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.164031 kernel: audit: type=1327 audit(1746665621.154:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.167000 audit[2391]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.167000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc243f6fa0 a2=0 a3=0 items=0 ppid=2160 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.172412 kernel: audit: type=1325 audit(1746665621.167:930): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.262981 systemd[1]: Created slice kubepods-besteffort-pod28375892_cf8e_4031_8ef5_1c1f93b9012d.slice. May 8 00:53:41.319664 systemd[1]: Created slice kubepods-besteffort-pod59039f99_e0ff_4596_980a_617a03c4c9ab.slice. May 8 00:53:41.335261 kubelet[2015]: I0508 00:53:41.335205 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-lib-modules\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335261 kubelet[2015]: I0508 00:53:41.335266 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-cni-log-dir\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335718 kubelet[2015]: I0508 00:53:41.335288 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-policysync\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335718 kubelet[2015]: I0508 00:53:41.335306 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/59039f99-e0ff-4596-980a-617a03c4c9ab-tigera-ca-bundle\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335718 kubelet[2015]: I0508 00:53:41.335327 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-var-lib-calico\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335718 kubelet[2015]: I0508 00:53:41.335350 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsdlf\" (UniqueName: \"kubernetes.io/projected/28375892-cf8e-4031-8ef5-1c1f93b9012d-kube-api-access-vsdlf\") pod \"calico-typha-776c7df59c-5gws7\" (UID: \"28375892-cf8e-4031-8ef5-1c1f93b9012d\") " pod="calico-system/calico-typha-776c7df59c-5gws7" May 8 00:53:41.335718 kubelet[2015]: I0508 00:53:41.335387 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-flexvol-driver-host\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335853 kubelet[2015]: I0508 00:53:41.335410 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-xtables-lock\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335853 kubelet[2015]: I0508 00:53:41.335434 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-var-run-calico\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335853 kubelet[2015]: I0508 00:53:41.335455 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/59039f99-e0ff-4596-980a-617a03c4c9ab-node-certs\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335853 kubelet[2015]: I0508 00:53:41.335477 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-cni-bin-dir\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.335853 kubelet[2015]: I0508 00:53:41.335500 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/59039f99-e0ff-4596-980a-617a03c4c9ab-cni-net-dir\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.336089 kubelet[2015]: I0508 00:53:41.335520 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/28375892-cf8e-4031-8ef5-1c1f93b9012d-typha-certs\") pod \"calico-typha-776c7df59c-5gws7\" (UID: \"28375892-cf8e-4031-8ef5-1c1f93b9012d\") " pod="calico-system/calico-typha-776c7df59c-5gws7" May 8 00:53:41.336089 kubelet[2015]: I0508 00:53:41.335539 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgw8s\" (UniqueName: \"kubernetes.io/projected/59039f99-e0ff-4596-980a-617a03c4c9ab-kube-api-access-vgw8s\") pod \"calico-node-dbmwv\" (UID: \"59039f99-e0ff-4596-980a-617a03c4c9ab\") " pod="calico-system/calico-node-dbmwv" May 8 00:53:41.336089 kubelet[2015]: I0508 00:53:41.335561 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/28375892-cf8e-4031-8ef5-1c1f93b9012d-tigera-ca-bundle\") pod \"calico-typha-776c7df59c-5gws7\" (UID: \"28375892-cf8e-4031-8ef5-1c1f93b9012d\") " pod="calico-system/calico-typha-776c7df59c-5gws7" May 8 00:53:41.427798 kubelet[2015]: E0508 00:53:41.427655 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:41.436471 kubelet[2015]: I0508 00:53:41.436429 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5c1860d0-9041-4cb5-8c0a-5201c4257215-varrun\") pod \"csi-node-driver-j4dtk\" (UID: \"5c1860d0-9041-4cb5-8c0a-5201c4257215\") " pod="calico-system/csi-node-driver-j4dtk" May 8 00:53:41.436776 kubelet[2015]: I0508 00:53:41.436757 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5c1860d0-9041-4cb5-8c0a-5201c4257215-kubelet-dir\") pod \"csi-node-driver-j4dtk\" (UID: \"5c1860d0-9041-4cb5-8c0a-5201c4257215\") " pod="calico-system/csi-node-driver-j4dtk" May 8 00:53:41.443793 kubelet[2015]: I0508 00:53:41.438896 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5c1860d0-9041-4cb5-8c0a-5201c4257215-registration-dir\") pod \"csi-node-driver-j4dtk\" (UID: \"5c1860d0-9041-4cb5-8c0a-5201c4257215\") " pod="calico-system/csi-node-driver-j4dtk" May 8 00:53:41.443981 kubelet[2015]: I0508 00:53:41.443963 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jfzwt\" (UniqueName: \"kubernetes.io/projected/5c1860d0-9041-4cb5-8c0a-5201c4257215-kube-api-access-jfzwt\") pod \"csi-node-driver-j4dtk\" (UID: \"5c1860d0-9041-4cb5-8c0a-5201c4257215\") " pod="calico-system/csi-node-driver-j4dtk" May 8 00:53:41.444213 kubelet[2015]: I0508 00:53:41.444182 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5c1860d0-9041-4cb5-8c0a-5201c4257215-socket-dir\") pod \"csi-node-driver-j4dtk\" (UID: \"5c1860d0-9041-4cb5-8c0a-5201c4257215\") " pod="calico-system/csi-node-driver-j4dtk" May 8 00:53:41.449431 kubelet[2015]: E0508 00:53:41.446759 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.449431 kubelet[2015]: W0508 00:53:41.446778 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.449431 kubelet[2015]: E0508 00:53:41.446798 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.449431 kubelet[2015]: E0508 00:53:41.449072 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.449431 kubelet[2015]: W0508 00:53:41.449095 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.449431 kubelet[2015]: E0508 00:53:41.449119 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.461603 kubelet[2015]: E0508 00:53:41.461558 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.461603 kubelet[2015]: W0508 00:53:41.461587 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.461777 kubelet[2015]: E0508 00:53:41.461615 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.545173 kubelet[2015]: E0508 00:53:41.545129 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.545173 kubelet[2015]: W0508 00:53:41.545158 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.545173 kubelet[2015]: E0508 00:53:41.545181 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.545509 kubelet[2015]: E0508 00:53:41.545442 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.545509 kubelet[2015]: W0508 00:53:41.545465 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.545509 kubelet[2015]: E0508 00:53:41.545479 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.545781 kubelet[2015]: E0508 00:53:41.545749 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.545849 kubelet[2015]: W0508 00:53:41.545781 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.545849 kubelet[2015]: E0508 00:53:41.545833 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.546195 kubelet[2015]: E0508 00:53:41.546168 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.546195 kubelet[2015]: W0508 00:53:41.546186 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.546320 kubelet[2015]: E0508 00:53:41.546218 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.546549 kubelet[2015]: E0508 00:53:41.546523 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.546549 kubelet[2015]: W0508 00:53:41.546544 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.546653 kubelet[2015]: E0508 00:53:41.546594 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.546824 kubelet[2015]: E0508 00:53:41.546806 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.546925 kubelet[2015]: W0508 00:53:41.546900 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.547043 kubelet[2015]: E0508 00:53:41.547014 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.547150 kubelet[2015]: E0508 00:53:41.547131 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.547150 kubelet[2015]: W0508 00:53:41.547147 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.547270 kubelet[2015]: E0508 00:53:41.547191 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.547383 kubelet[2015]: E0508 00:53:41.547348 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.547443 kubelet[2015]: W0508 00:53:41.547383 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.547496 kubelet[2015]: E0508 00:53:41.547473 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.547614 kubelet[2015]: E0508 00:53:41.547595 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.547683 kubelet[2015]: W0508 00:53:41.547613 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.547683 kubelet[2015]: E0508 00:53:41.547638 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.547943 kubelet[2015]: E0508 00:53:41.547914 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.547943 kubelet[2015]: W0508 00:53:41.547930 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.548163 kubelet[2015]: E0508 00:53:41.548039 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.548190 kubelet[2015]: E0508 00:53:41.548174 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.548190 kubelet[2015]: W0508 00:53:41.548187 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.548314 kubelet[2015]: E0508 00:53:41.548287 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.548424 kubelet[2015]: E0508 00:53:41.548409 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.548424 kubelet[2015]: W0508 00:53:41.548419 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.548512 kubelet[2015]: E0508 00:53:41.548485 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.548685 kubelet[2015]: E0508 00:53:41.548640 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.548685 kubelet[2015]: W0508 00:53:41.548655 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.548801 kubelet[2015]: E0508 00:53:41.548692 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.548888 kubelet[2015]: E0508 00:53:41.548859 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.548888 kubelet[2015]: W0508 00:53:41.548871 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.548983 kubelet[2015]: E0508 00:53:41.548924 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.549079 kubelet[2015]: E0508 00:53:41.549050 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.549079 kubelet[2015]: W0508 00:53:41.549074 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.549188 kubelet[2015]: E0508 00:53:41.549094 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.549447 kubelet[2015]: E0508 00:53:41.549428 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.549447 kubelet[2015]: W0508 00:53:41.549447 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.549548 kubelet[2015]: E0508 00:53:41.549479 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.549663 kubelet[2015]: E0508 00:53:41.549648 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.549663 kubelet[2015]: W0508 00:53:41.549661 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.549747 kubelet[2015]: E0508 00:53:41.549698 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.549905 kubelet[2015]: E0508 00:53:41.549887 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.549905 kubelet[2015]: W0508 00:53:41.549903 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.549997 kubelet[2015]: E0508 00:53:41.549943 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.550133 kubelet[2015]: E0508 00:53:41.550112 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.550133 kubelet[2015]: W0508 00:53:41.550130 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.550226 kubelet[2015]: E0508 00:53:41.550169 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.550351 kubelet[2015]: E0508 00:53:41.550331 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.550351 kubelet[2015]: W0508 00:53:41.550345 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.550503 kubelet[2015]: E0508 00:53:41.550404 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.550684 kubelet[2015]: E0508 00:53:41.550666 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.550754 kubelet[2015]: W0508 00:53:41.550682 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.550754 kubelet[2015]: E0508 00:53:41.550707 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.550993 kubelet[2015]: E0508 00:53:41.550971 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.550993 kubelet[2015]: W0508 00:53:41.550986 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.551097 kubelet[2015]: E0508 00:53:41.551005 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.551317 kubelet[2015]: E0508 00:53:41.551293 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.551317 kubelet[2015]: W0508 00:53:41.551312 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.551501 kubelet[2015]: E0508 00:53:41.551334 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.551634 kubelet[2015]: E0508 00:53:41.551613 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.551634 kubelet[2015]: W0508 00:53:41.551630 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.551749 kubelet[2015]: E0508 00:53:41.551655 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.552017 kubelet[2015]: E0508 00:53:41.551997 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.552017 kubelet[2015]: W0508 00:53:41.552012 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.552139 kubelet[2015]: E0508 00:53:41.552024 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.561870 kubelet[2015]: E0508 00:53:41.561819 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:41.561870 kubelet[2015]: W0508 00:53:41.561839 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:41.561870 kubelet[2015]: E0508 00:53:41.561854 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:41.565950 kubelet[2015]: E0508 00:53:41.565906 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:41.566602 env[1234]: time="2025-05-08T00:53:41.566555841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-776c7df59c-5gws7,Uid:28375892-cf8e-4031-8ef5-1c1f93b9012d,Namespace:calico-system,Attempt:0,}" May 8 00:53:41.622596 kubelet[2015]: E0508 00:53:41.622550 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:41.623121 env[1234]: time="2025-05-08T00:53:41.623070077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dbmwv,Uid:59039f99-e0ff-4596-980a-617a03c4c9ab,Namespace:calico-system,Attempt:0,}" May 8 00:53:41.859835 env[1234]: time="2025-05-08T00:53:41.859742053Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:41.859835 env[1234]: time="2025-05-08T00:53:41.859800793Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:41.859835 env[1234]: time="2025-05-08T00:53:41.859820981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:41.860091 env[1234]: time="2025-05-08T00:53:41.860042388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f21aa39ce46ed900c7a38f5ed2bca0b7288a66151ee64961a25b08d9f8f7f8d pid=2435 runtime=io.containerd.runc.v2 May 8 00:53:41.865158 env[1234]: time="2025-05-08T00:53:41.864127296Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:41.865158 env[1234]: time="2025-05-08T00:53:41.864186066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:41.865158 env[1234]: time="2025-05-08T00:53:41.864199251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:41.865158 env[1234]: time="2025-05-08T00:53:41.864342250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2 pid=2450 runtime=io.containerd.runc.v2 May 8 00:53:41.872893 systemd[1]: Started cri-containerd-4f21aa39ce46ed900c7a38f5ed2bca0b7288a66151ee64961a25b08d9f8f7f8d.scope. May 8 00:53:41.883347 systemd[1]: Started cri-containerd-25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2.scope. May 8 00:53:41.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.885000 audit: BPF prog-id=118 op=LOAD May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2435 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323161613339636534366564393030633761333866356564326263 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2435 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323161613339636534366564393030633761333866356564326263 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit: BPF prog-id=119 op=LOAD May 8 00:53:41.886000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030ee50 items=0 ppid=2435 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323161613339636534366564393030633761333866356564326263 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit: BPF prog-id=120 op=LOAD May 8 00:53:41.886000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030ee98 items=0 ppid=2435 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323161613339636534366564393030633761333866356564326263 May 8 00:53:41.886000 audit: BPF prog-id=120 op=UNLOAD May 8 00:53:41.886000 audit: BPF prog-id=119 op=UNLOAD May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.886000 audit: BPF prog-id=121 op=LOAD May 8 00:53:41.886000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030f2a8 items=0 ppid=2435 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323161613339636534366564393030633761333866356564326263 May 8 00:53:41.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit: BPF prog-id=122 op=LOAD May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2450 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613033313935613439323663636432663065613830616438323431 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2450 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613033313935613439323663636432663065613830616438323431 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit: BPF prog-id=123 op=LOAD May 8 00:53:41.894000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000302320 items=0 ppid=2450 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613033313935613439323663636432663065613830616438323431 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.894000 audit: BPF prog-id=124 op=LOAD May 8 00:53:41.894000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000302368 items=0 ppid=2450 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613033313935613439323663636432663065613830616438323431 May 8 00:53:41.895000 audit: BPF prog-id=124 op=UNLOAD May 8 00:53:41.895000 audit: BPF prog-id=123 op=UNLOAD May 8 00:53:41.895000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:41.895000 audit: BPF prog-id=125 op=LOAD May 8 00:53:41.895000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000302778 items=0 ppid=2450 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613033313935613439323663636432663065613830616438323431 May 8 00:53:41.911555 env[1234]: time="2025-05-08T00:53:41.911507744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dbmwv,Uid:59039f99-e0ff-4596-980a-617a03c4c9ab,Namespace:calico-system,Attempt:0,} returns sandbox id \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\"" May 8 00:53:41.912430 env[1234]: time="2025-05-08T00:53:41.912099706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-776c7df59c-5gws7,Uid:28375892-cf8e-4031-8ef5-1c1f93b9012d,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f21aa39ce46ed900c7a38f5ed2bca0b7288a66151ee64961a25b08d9f8f7f8d\"" May 8 00:53:41.912584 kubelet[2015]: E0508 00:53:41.912258 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:41.913273 kubelet[2015]: E0508 00:53:41.913250 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:41.913343 env[1234]: time="2025-05-08T00:53:41.913306885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:53:42.178000 audit[2508]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:42.178000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe27c46dd0 a2=0 a3=7ffe27c46dbc items=0 ppid=2160 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:42.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:42.186000 audit[2508]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:42.186000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe27c46dd0 a2=0 a3=0 items=0 ppid=2160 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:42.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:42.869306 kubelet[2015]: E0508 00:53:42.869233 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:43.731556 env[1234]: time="2025-05-08T00:53:43.731493784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.733288 env[1234]: time="2025-05-08T00:53:43.733245746Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.734749 env[1234]: time="2025-05-08T00:53:43.734707783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.736061 env[1234]: time="2025-05-08T00:53:43.736032984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.736445 env[1234]: time="2025-05-08T00:53:43.736393752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 8 00:53:43.737574 env[1234]: time="2025-05-08T00:53:43.737472579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:53:43.738357 env[1234]: time="2025-05-08T00:53:43.738293632Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:53:43.741414 kubelet[2015]: E0508 00:53:43.741385 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:43.753562 kubelet[2015]: E0508 00:53:43.753530 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:43.753562 kubelet[2015]: W0508 00:53:43.753551 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:43.753800 kubelet[2015]: E0508 00:53:43.753572 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:43.753840 kubelet[2015]: E0508 00:53:43.753801 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:43.753840 kubelet[2015]: W0508 00:53:43.753811 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:43.753840 kubelet[2015]: E0508 00:53:43.753820 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:43.753965 kubelet[2015]: E0508 00:53:43.753935 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:43.753965 kubelet[2015]: W0508 00:53:43.753947 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:43.753965 kubelet[2015]: E0508 00:53:43.753954 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:43.754147 kubelet[2015]: E0508 00:53:43.754125 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:43.754147 kubelet[2015]: W0508 00:53:43.754143 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:43.754244 kubelet[2015]: E0508 00:53:43.754158 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:43.755222 kubelet[2015]: E0508 00:53:43.754794 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:43.755222 kubelet[2015]: W0508 00:53:43.754809 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:43.755222 kubelet[2015]: E0508 00:53:43.754819 2015 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:43.757546 env[1234]: time="2025-05-08T00:53:43.757488592Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd\"" May 8 00:53:43.758561 env[1234]: time="2025-05-08T00:53:43.758521854Z" level=info msg="StartContainer for \"28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd\"" May 8 00:53:43.776824 systemd[1]: Started cri-containerd-28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd.scope. May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7e590d2858 items=0 ppid=2450 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383938636535396339623438663433353066383831653032363536 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit: BPF prog-id=126 op=LOAD May 8 00:53:43.791000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dbd8 items=0 ppid=2450 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383938636535396339623438663433353066383831653032363536 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit: BPF prog-id=127 op=LOAD May 8 00:53:43.791000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dc28 items=0 ppid=2450 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383938636535396339623438663433353066383831653032363536 May 8 00:53:43.791000 audit: BPF prog-id=127 op=UNLOAD May 8 00:53:43.791000 audit: BPF prog-id=126 op=UNLOAD May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.791000 audit: BPF prog-id=128 op=LOAD May 8 00:53:43.791000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032dcb8 items=0 ppid=2450 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383938636535396339623438663433353066383831653032363536 May 8 00:53:43.808646 env[1234]: time="2025-05-08T00:53:43.808573759Z" level=info msg="StartContainer for \"28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd\" returns successfully" May 8 00:53:43.815611 systemd[1]: cri-containerd-28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd.scope: Deactivated successfully. May 8 00:53:43.821000 audit: BPF prog-id=128 op=UNLOAD May 8 00:53:43.834096 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd-rootfs.mount: Deactivated successfully. May 8 00:53:43.905000 env[1234]: time="2025-05-08T00:53:43.904940377Z" level=info msg="shim disconnected" id=28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd May 8 00:53:43.905339 env[1234]: time="2025-05-08T00:53:43.905310834Z" level=warning msg="cleaning up after shim disconnected" id=28898ce59c9b48f4350f881e02656bbf6001589f6fa7424146090a18497ec5cd namespace=k8s.io May 8 00:53:43.905605 kubelet[2015]: E0508 00:53:43.905473 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:43.906106 env[1234]: time="2025-05-08T00:53:43.906084928Z" level=info msg="cleaning up dead shim" May 8 00:53:43.917300 env[1234]: time="2025-05-08T00:53:43.917256501Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:53:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2559 runtime=io.containerd.runc.v2\n" May 8 00:53:44.869771 kubelet[2015]: E0508 00:53:44.868817 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:44.908035 kubelet[2015]: E0508 00:53:44.907996 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:46.869410 kubelet[2015]: E0508 00:53:46.869111 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:48.756362 env[1234]: time="2025-05-08T00:53:48.756296719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:48.760452 env[1234]: time="2025-05-08T00:53:48.760409323Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:48.762076 env[1234]: time="2025-05-08T00:53:48.762026650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:48.764523 env[1234]: time="2025-05-08T00:53:48.764474449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:48.765086 env[1234]: time="2025-05-08T00:53:48.765063414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 8 00:53:48.766669 env[1234]: time="2025-05-08T00:53:48.766596574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:53:48.774119 env[1234]: time="2025-05-08T00:53:48.774052248Z" level=info msg="CreateContainer within sandbox \"4f21aa39ce46ed900c7a38f5ed2bca0b7288a66151ee64961a25b08d9f8f7f8d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:53:48.791037 env[1234]: time="2025-05-08T00:53:48.790963520Z" level=info msg="CreateContainer within sandbox \"4f21aa39ce46ed900c7a38f5ed2bca0b7288a66151ee64961a25b08d9f8f7f8d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a9bba3ee530e404e123adad1b0c5ba8a4b967d4512331c9d6c536d686183a882\"" May 8 00:53:48.791768 env[1234]: time="2025-05-08T00:53:48.791724299Z" level=info msg="StartContainer for \"a9bba3ee530e404e123adad1b0c5ba8a4b967d4512331c9d6c536d686183a882\"" May 8 00:53:48.812099 systemd[1]: Started cri-containerd-a9bba3ee530e404e123adad1b0c5ba8a4b967d4512331c9d6c536d686183a882.scope. May 8 00:53:48.833532 kernel: kauditd_printk_skb: 166 callbacks suppressed May 8 00:53:48.833737 kernel: audit: type=1400 audit(1746665628.828:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.838634 kernel: audit: type=1400 audit(1746665628.828:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.838695 kernel: audit: type=1400 audit(1746665628.828:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.842567 kernel: audit: type=1400 audit(1746665628.828:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.846330 kernel: audit: type=1400 audit(1746665628.828:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.853870 kernel: audit: type=1400 audit(1746665628.828:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.857796 kernel: audit: type=1400 audit(1746665628.828:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.857945 kernel: audit: type=1400 audit(1746665628.828:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.865087 kernel: audit: type=1400 audit(1746665628.828:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.865165 kernel: audit: type=1400 audit(1746665628.837:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.837000 audit: BPF prog-id=129 op=LOAD May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.869164 kubelet[2015]: E0508 00:53:48.869105 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:48.839000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2435 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:48.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139626261336565353330653430346531323361646164316230633562 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2435 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:48.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139626261336565353330653430346531323361646164316230633562 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.839000 audit: BPF prog-id=130 op=LOAD May 8 00:53:48.839000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003eca40 items=0 ppid=2435 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:48.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139626261336565353330653430346531323361646164316230633562 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.848000 audit: BPF prog-id=131 op=LOAD May 8 00:53:48.848000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003eca88 items=0 ppid=2435 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:48.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139626261336565353330653430346531323361646164316230633562 May 8 00:53:48.852000 audit: BPF prog-id=131 op=UNLOAD May 8 00:53:48.852000 audit: BPF prog-id=130 op=UNLOAD May 8 00:53:48.852000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:48.852000 audit: BPF prog-id=132 op=LOAD May 8 00:53:48.852000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ece98 items=0 ppid=2435 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:48.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139626261336565353330653430346531323361646164316230633562 May 8 00:53:48.906226 env[1234]: time="2025-05-08T00:53:48.906157639Z" level=info msg="StartContainer for \"a9bba3ee530e404e123adad1b0c5ba8a4b967d4512331c9d6c536d686183a882\" returns successfully" May 8 00:53:48.918179 kubelet[2015]: E0508 00:53:48.916972 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:48.930772 kubelet[2015]: I0508 00:53:48.930699 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-776c7df59c-5gws7" podStartSLOduration=1.078210829 podStartE2EDuration="7.930672823s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:53:41.913619102 +0000 UTC m=+13.131968314" lastFinishedPulling="2025-05-08 00:53:48.766081096 +0000 UTC m=+19.984430308" observedRunningTime="2025-05-08 00:53:48.93016022 +0000 UTC m=+20.148509432" watchObservedRunningTime="2025-05-08 00:53:48.930672823 +0000 UTC m=+20.149022035" May 8 00:53:49.919291 kubelet[2015]: I0508 00:53:49.919235 2015 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:49.919917 kubelet[2015]: E0508 00:53:49.919672 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:50.868595 kubelet[2015]: E0508 00:53:50.868529 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:52.868685 kubelet[2015]: E0508 00:53:52.868592 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:53.080444 kubelet[2015]: I0508 00:53:53.080355 2015 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:53.080865 kubelet[2015]: E0508 00:53:53.080823 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:53.103000 audit[2619]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:53.103000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd95e71670 a2=0 a3=7ffd95e7165c items=0 ppid=2160 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:53.110000 audit[2619]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:53.110000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd95e71670 a2=0 a3=7ffd95e7165c items=0 ppid=2160 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:53.925408 kubelet[2015]: E0508 00:53:53.925174 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:54.869158 kubelet[2015]: E0508 00:53:54.869069 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:56.868410 kubelet[2015]: E0508 00:53:56.868310 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:57.547023 kernel: kauditd_printk_skb: 53 callbacks suppressed May 8 00:53:57.547188 kernel: audit: type=1130 audit(1746665637.538:996): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.137:22-10.0.0.1:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:57.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.137:22-10.0.0.1:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:57.539852 systemd[1]: Started sshd@7-10.0.0.137:22-10.0.0.1:49122.service. May 8 00:53:57.578000 audit[2621]: USER_ACCT pid=2621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.580641 sshd[2621]: Accepted publickey for core from 10.0.0.1 port 49122 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:53:57.583000 audit[2621]: CRED_ACQ pid=2621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.585075 sshd[2621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:57.589157 kernel: audit: type=1101 audit(1746665637.578:997): pid=2621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.589265 kernel: audit: type=1103 audit(1746665637.583:998): pid=2621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.589305 kernel: audit: type=1006 audit(1746665637.583:999): pid=2621 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 8 00:53:57.590334 systemd[1]: Started session-8.scope. May 8 00:53:57.591560 systemd-logind[1220]: New session 8 of user core. May 8 00:53:57.591941 kernel: audit: type=1300 audit(1746665637.583:999): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b558df0 a2=3 a3=0 items=0 ppid=1 pid=2621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.583000 audit[2621]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b558df0 a2=3 a3=0 items=0 ppid=1 pid=2621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.596627 kernel: audit: type=1327 audit(1746665637.583:999): proctitle=737368643A20636F7265205B707269765D May 8 00:53:57.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:57.602198 kernel: audit: type=1105 audit(1746665637.595:1000): pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.595000 audit[2621]: USER_START pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.597000 audit[2623]: CRED_ACQ pid=2623 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.605929 kernel: audit: type=1103 audit(1746665637.597:1001): pid=2623 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.709843 sshd[2621]: pam_unix(sshd:session): session closed for user core May 8 00:53:57.709000 audit[2621]: USER_END pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.712064 systemd[1]: sshd@7-10.0.0.137:22-10.0.0.1:49122.service: Deactivated successfully. May 8 00:53:57.712746 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:53:57.713401 systemd-logind[1220]: Session 8 logged out. Waiting for processes to exit. May 8 00:53:57.714157 systemd-logind[1220]: Removed session 8. May 8 00:53:57.709000 audit[2621]: CRED_DISP pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.719779 kernel: audit: type=1106 audit(1746665637.709:1002): pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.719850 kernel: audit: type=1104 audit(1746665637.709:1003): pid=2621 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:57.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.137:22-10.0.0.1:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:58.869499 kubelet[2015]: E0508 00:53:58.869355 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:53:58.877664 env[1234]: time="2025-05-08T00:53:58.877598436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:58.879904 env[1234]: time="2025-05-08T00:53:58.879828572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:58.881688 env[1234]: time="2025-05-08T00:53:58.881631256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:58.884655 env[1234]: time="2025-05-08T00:53:58.884601651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:58.884734 env[1234]: time="2025-05-08T00:53:58.884672063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 8 00:53:58.889238 env[1234]: time="2025-05-08T00:53:58.889151892Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:53:58.903242 env[1234]: time="2025-05-08T00:53:58.903181436Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6\"" May 8 00:53:58.903931 env[1234]: time="2025-05-08T00:53:58.903894745Z" level=info msg="StartContainer for \"4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6\"" May 8 00:53:58.926432 systemd[1]: Started cri-containerd-4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6.scope. May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5811b8f878 items=0 ppid=2450 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:58.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633666646332343038306631666132626530613330636361656132 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit: BPF prog-id=133 op=LOAD May 8 00:53:58.939000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c6048 items=0 ppid=2450 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:58.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633666646332343038306631666132626530613330636361656132 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit: BPF prog-id=134 op=LOAD May 8 00:53:58.939000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c6098 items=0 ppid=2450 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:58.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633666646332343038306631666132626530613330636361656132 May 8 00:53:58.939000 audit: BPF prog-id=134 op=UNLOAD May 8 00:53:58.939000 audit: BPF prog-id=133 op=UNLOAD May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:58.939000 audit: BPF prog-id=135 op=LOAD May 8 00:53:58.939000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c6128 items=0 ppid=2450 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:58.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633666646332343038306631666132626530613330636361656132 May 8 00:53:59.252170 env[1234]: time="2025-05-08T00:53:59.251065992Z" level=info msg="StartContainer for \"4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6\" returns successfully" May 8 00:54:00.164347 kubelet[2015]: E0508 00:54:00.164280 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:00.324535 systemd[1]: cri-containerd-4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6.scope: Deactivated successfully. May 8 00:54:00.328000 audit: BPF prog-id=135 op=UNLOAD May 8 00:54:00.340217 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6-rootfs.mount: Deactivated successfully. May 8 00:54:00.348618 env[1234]: time="2025-05-08T00:54:00.348561790Z" level=info msg="shim disconnected" id=4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6 May 8 00:54:00.348618 env[1234]: time="2025-05-08T00:54:00.348617204Z" level=warning msg="cleaning up after shim disconnected" id=4fc6fdc24080f1fa2be0a30ccaea21938607e2ad79a294f2c4de1abc1a1aa7a6 namespace=k8s.io May 8 00:54:00.349148 env[1234]: time="2025-05-08T00:54:00.348628565Z" level=info msg="cleaning up dead shim" May 8 00:54:00.355883 env[1234]: time="2025-05-08T00:54:00.355825273Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:54:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2684 runtime=io.containerd.runc.v2\n" May 8 00:54:00.379130 kubelet[2015]: I0508 00:54:00.379082 2015 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 8 00:54:00.404350 systemd[1]: Created slice kubepods-burstable-podf711de22_a49e_4bb2_afd9_4f662b0e29ae.slice. May 8 00:54:00.409947 systemd[1]: Created slice kubepods-besteffort-pod48e02dfd_d244_4ad0_b0dc_cb8a4440aa3d.slice. May 8 00:54:00.413830 systemd[1]: Created slice kubepods-burstable-pod878f6d96_6e02_4a11_9fcf_a72dfc3b7541.slice. May 8 00:54:00.417570 systemd[1]: Created slice kubepods-besteffort-podc4f6f1e7_458d_46ec_85c4_573c69c50507.slice. May 8 00:54:00.421276 systemd[1]: Created slice kubepods-besteffort-pod56531f88_a3b4_4d98_a0d7_ed634d8f4930.slice. May 8 00:54:00.577896 kubelet[2015]: I0508 00:54:00.577828 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c4f6f1e7-458d-46ec-85c4-573c69c50507-tigera-ca-bundle\") pod \"calico-kube-controllers-7845dcc4b7-6v7qf\" (UID: \"c4f6f1e7-458d-46ec-85c4-573c69c50507\") " pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" May 8 00:54:00.577896 kubelet[2015]: I0508 00:54:00.577887 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/878f6d96-6e02-4a11-9fcf-a72dfc3b7541-config-volume\") pod \"coredns-6f6b679f8f-k7bm9\" (UID: \"878f6d96-6e02-4a11-9fcf-a72dfc3b7541\") " pod="kube-system/coredns-6f6b679f8f-k7bm9" May 8 00:54:00.578138 kubelet[2015]: I0508 00:54:00.577918 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d-calico-apiserver-certs\") pod \"calico-apiserver-5fd85c86c-7n8xg\" (UID: \"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d\") " pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" May 8 00:54:00.578138 kubelet[2015]: I0508 00:54:00.577940 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f711de22-a49e-4bb2-afd9-4f662b0e29ae-config-volume\") pod \"coredns-6f6b679f8f-m8b6z\" (UID: \"f711de22-a49e-4bb2-afd9-4f662b0e29ae\") " pod="kube-system/coredns-6f6b679f8f-m8b6z" May 8 00:54:00.578138 kubelet[2015]: I0508 00:54:00.577958 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9b545\" (UniqueName: \"kubernetes.io/projected/c4f6f1e7-458d-46ec-85c4-573c69c50507-kube-api-access-9b545\") pod \"calico-kube-controllers-7845dcc4b7-6v7qf\" (UID: \"c4f6f1e7-458d-46ec-85c4-573c69c50507\") " pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" May 8 00:54:00.578138 kubelet[2015]: I0508 00:54:00.577987 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jclrr\" (UniqueName: \"kubernetes.io/projected/878f6d96-6e02-4a11-9fcf-a72dfc3b7541-kube-api-access-jclrr\") pod \"coredns-6f6b679f8f-k7bm9\" (UID: \"878f6d96-6e02-4a11-9fcf-a72dfc3b7541\") " pod="kube-system/coredns-6f6b679f8f-k7bm9" May 8 00:54:00.578138 kubelet[2015]: I0508 00:54:00.578041 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9nrsx\" (UniqueName: \"kubernetes.io/projected/48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d-kube-api-access-9nrsx\") pod \"calico-apiserver-5fd85c86c-7n8xg\" (UID: \"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d\") " pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" May 8 00:54:00.578313 kubelet[2015]: I0508 00:54:00.578104 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k4w58\" (UniqueName: \"kubernetes.io/projected/f711de22-a49e-4bb2-afd9-4f662b0e29ae-kube-api-access-k4w58\") pod \"coredns-6f6b679f8f-m8b6z\" (UID: \"f711de22-a49e-4bb2-afd9-4f662b0e29ae\") " pod="kube-system/coredns-6f6b679f8f-m8b6z" May 8 00:54:00.578313 kubelet[2015]: I0508 00:54:00.578148 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvsk6\" (UniqueName: \"kubernetes.io/projected/56531f88-a3b4-4d98-a0d7-ed634d8f4930-kube-api-access-rvsk6\") pod \"calico-apiserver-5fd85c86c-zhsrj\" (UID: \"56531f88-a3b4-4d98-a0d7-ed634d8f4930\") " pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" May 8 00:54:00.578313 kubelet[2015]: I0508 00:54:00.578164 2015 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/56531f88-a3b4-4d98-a0d7-ed634d8f4930-calico-apiserver-certs\") pod \"calico-apiserver-5fd85c86c-zhsrj\" (UID: \"56531f88-a3b4-4d98-a0d7-ed634d8f4930\") " pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" May 8 00:54:00.707406 kubelet[2015]: E0508 00:54:00.706928 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:00.707597 env[1234]: time="2025-05-08T00:54:00.707514145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-m8b6z,Uid:f711de22-a49e-4bb2-afd9-4f662b0e29ae,Namespace:kube-system,Attempt:0,}" May 8 00:54:00.712801 env[1234]: time="2025-05-08T00:54:00.712761493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-7n8xg,Uid:48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d,Namespace:calico-apiserver,Attempt:0,}" May 8 00:54:00.717054 kubelet[2015]: E0508 00:54:00.717023 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:00.717446 env[1234]: time="2025-05-08T00:54:00.717387255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7bm9,Uid:878f6d96-6e02-4a11-9fcf-a72dfc3b7541,Namespace:kube-system,Attempt:0,}" May 8 00:54:00.720343 env[1234]: time="2025-05-08T00:54:00.720305903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7845dcc4b7-6v7qf,Uid:c4f6f1e7-458d-46ec-85c4-573c69c50507,Namespace:calico-system,Attempt:0,}" May 8 00:54:00.724119 env[1234]: time="2025-05-08T00:54:00.724083413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-zhsrj,Uid:56531f88-a3b4-4d98-a0d7-ed634d8f4930,Namespace:calico-apiserver,Attempt:0,}" May 8 00:54:00.840178 env[1234]: time="2025-05-08T00:54:00.840086084Z" level=error msg="Failed to destroy network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.840522 env[1234]: time="2025-05-08T00:54:00.840484432Z" level=error msg="encountered an error cleaning up failed sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.840795 env[1234]: time="2025-05-08T00:54:00.840758065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7bm9,Uid:878f6d96-6e02-4a11-9fcf-a72dfc3b7541,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.841161 kubelet[2015]: E0508 00:54:00.841116 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.841248 kubelet[2015]: E0508 00:54:00.841199 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k7bm9" May 8 00:54:00.841248 kubelet[2015]: E0508 00:54:00.841218 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k7bm9" May 8 00:54:00.841303 kubelet[2015]: E0508 00:54:00.841281 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-k7bm9_kube-system(878f6d96-6e02-4a11-9fcf-a72dfc3b7541)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-k7bm9_kube-system(878f6d96-6e02-4a11-9fcf-a72dfc3b7541)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k7bm9" podUID="878f6d96-6e02-4a11-9fcf-a72dfc3b7541" May 8 00:54:00.844007 env[1234]: time="2025-05-08T00:54:00.843961147Z" level=error msg="Failed to destroy network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.844518 env[1234]: time="2025-05-08T00:54:00.844489969Z" level=error msg="encountered an error cleaning up failed sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.844658 env[1234]: time="2025-05-08T00:54:00.844624311Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7845dcc4b7-6v7qf,Uid:c4f6f1e7-458d-46ec-85c4-573c69c50507,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.845531 kubelet[2015]: E0508 00:54:00.845226 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.845531 kubelet[2015]: E0508 00:54:00.845272 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" May 8 00:54:00.845531 kubelet[2015]: E0508 00:54:00.845289 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" May 8 00:54:00.846485 kubelet[2015]: E0508 00:54:00.845327 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7845dcc4b7-6v7qf_calico-system(c4f6f1e7-458d-46ec-85c4-573c69c50507)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7845dcc4b7-6v7qf_calico-system(c4f6f1e7-458d-46ec-85c4-573c69c50507)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" podUID="c4f6f1e7-458d-46ec-85c4-573c69c50507" May 8 00:54:00.861091 env[1234]: time="2025-05-08T00:54:00.860996930Z" level=error msg="Failed to destroy network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.861396 env[1234]: time="2025-05-08T00:54:00.861347098Z" level=error msg="encountered an error cleaning up failed sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.861460 env[1234]: time="2025-05-08T00:54:00.861416609Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-7n8xg,Uid:48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.861767 kubelet[2015]: E0508 00:54:00.861709 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.861846 kubelet[2015]: E0508 00:54:00.861798 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" May 8 00:54:00.861846 kubelet[2015]: E0508 00:54:00.861829 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" May 8 00:54:00.861918 kubelet[2015]: E0508 00:54:00.861885 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fd85c86c-7n8xg_calico-apiserver(48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fd85c86c-7n8xg_calico-apiserver(48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" podUID="48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d" May 8 00:54:00.864408 env[1234]: time="2025-05-08T00:54:00.864351306Z" level=error msg="Failed to destroy network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.864878 env[1234]: time="2025-05-08T00:54:00.864836257Z" level=error msg="encountered an error cleaning up failed sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.864966 env[1234]: time="2025-05-08T00:54:00.864898934Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-m8b6z,Uid:f711de22-a49e-4bb2-afd9-4f662b0e29ae,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.865097 kubelet[2015]: E0508 00:54:00.865072 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.865147 kubelet[2015]: E0508 00:54:00.865114 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-m8b6z" May 8 00:54:00.865147 kubelet[2015]: E0508 00:54:00.865136 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-m8b6z" May 8 00:54:00.865201 kubelet[2015]: E0508 00:54:00.865175 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-m8b6z_kube-system(f711de22-a49e-4bb2-afd9-4f662b0e29ae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-m8b6z_kube-system(f711de22-a49e-4bb2-afd9-4f662b0e29ae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-m8b6z" podUID="f711de22-a49e-4bb2-afd9-4f662b0e29ae" May 8 00:54:00.865457 env[1234]: time="2025-05-08T00:54:00.865399383Z" level=error msg="Failed to destroy network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.865835 env[1234]: time="2025-05-08T00:54:00.865803031Z" level=error msg="encountered an error cleaning up failed sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.865903 env[1234]: time="2025-05-08T00:54:00.865859958Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-zhsrj,Uid:56531f88-a3b4-4d98-a0d7-ed634d8f4930,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.866063 kubelet[2015]: E0508 00:54:00.866032 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.866132 kubelet[2015]: E0508 00:54:00.866075 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" May 8 00:54:00.866132 kubelet[2015]: E0508 00:54:00.866095 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" May 8 00:54:00.866188 kubelet[2015]: E0508 00:54:00.866143 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fd85c86c-zhsrj_calico-apiserver(56531f88-a3b4-4d98-a0d7-ed634d8f4930)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fd85c86c-zhsrj_calico-apiserver(56531f88-a3b4-4d98-a0d7-ed634d8f4930)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" podUID="56531f88-a3b4-4d98-a0d7-ed634d8f4930" May 8 00:54:00.874386 systemd[1]: Created slice kubepods-besteffort-pod5c1860d0_9041_4cb5_8c0a_5201c4257215.slice. May 8 00:54:00.876517 env[1234]: time="2025-05-08T00:54:00.876483577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j4dtk,Uid:5c1860d0-9041-4cb5-8c0a-5201c4257215,Namespace:calico-system,Attempt:0,}" May 8 00:54:00.930976 env[1234]: time="2025-05-08T00:54:00.930903837Z" level=error msg="Failed to destroy network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.931283 env[1234]: time="2025-05-08T00:54:00.931256077Z" level=error msg="encountered an error cleaning up failed sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.931330 env[1234]: time="2025-05-08T00:54:00.931306382Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j4dtk,Uid:5c1860d0-9041-4cb5-8c0a-5201c4257215,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.931649 kubelet[2015]: E0508 00:54:00.931593 2015 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:00.931722 kubelet[2015]: E0508 00:54:00.931688 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-j4dtk" May 8 00:54:00.931722 kubelet[2015]: E0508 00:54:00.931710 2015 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-j4dtk" May 8 00:54:00.931782 kubelet[2015]: E0508 00:54:00.931756 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-j4dtk_calico-system(5c1860d0-9041-4cb5-8c0a-5201c4257215)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-j4dtk_calico-system(5c1860d0-9041-4cb5-8c0a-5201c4257215)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:54:01.166204 kubelet[2015]: I0508 00:54:01.166163 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:01.168061 kubelet[2015]: E0508 00:54:01.168034 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:01.168271 env[1234]: time="2025-05-08T00:54:01.168228530Z" level=info msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" May 8 00:54:01.168710 env[1234]: time="2025-05-08T00:54:01.168663788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:54:01.168912 kubelet[2015]: I0508 00:54:01.168886 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:01.169341 env[1234]: time="2025-05-08T00:54:01.169278501Z" level=info msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" May 8 00:54:01.175511 kubelet[2015]: I0508 00:54:01.171493 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:01.175511 kubelet[2015]: I0508 00:54:01.174541 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:01.175765 env[1234]: time="2025-05-08T00:54:01.171954604Z" level=info msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" May 8 00:54:01.175765 env[1234]: time="2025-05-08T00:54:01.175035375Z" level=info msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" May 8 00:54:01.177100 kubelet[2015]: I0508 00:54:01.177047 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:01.177716 env[1234]: time="2025-05-08T00:54:01.177528845Z" level=info msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" May 8 00:54:01.181177 kubelet[2015]: I0508 00:54:01.180707 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:01.181536 env[1234]: time="2025-05-08T00:54:01.181492765Z" level=info msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" May 8 00:54:01.207061 env[1234]: time="2025-05-08T00:54:01.206977354Z" level=error msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" failed" error="failed to destroy network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.207340 kubelet[2015]: E0508 00:54:01.207301 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:01.207433 kubelet[2015]: E0508 00:54:01.207379 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc"} May 8 00:54:01.207464 kubelet[2015]: E0508 00:54:01.207439 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f711de22-a49e-4bb2-afd9-4f662b0e29ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.207526 kubelet[2015]: E0508 00:54:01.207461 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f711de22-a49e-4bb2-afd9-4f662b0e29ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-m8b6z" podUID="f711de22-a49e-4bb2-afd9-4f662b0e29ae" May 8 00:54:01.218446 env[1234]: time="2025-05-08T00:54:01.218356961Z" level=error msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" failed" error="failed to destroy network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.218684 kubelet[2015]: E0508 00:54:01.218638 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:01.218777 kubelet[2015]: E0508 00:54:01.218699 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943"} May 8 00:54:01.218777 kubelet[2015]: E0508 00:54:01.218733 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"878f6d96-6e02-4a11-9fcf-a72dfc3b7541\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.218777 kubelet[2015]: E0508 00:54:01.218758 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"878f6d96-6e02-4a11-9fcf-a72dfc3b7541\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k7bm9" podUID="878f6d96-6e02-4a11-9fcf-a72dfc3b7541" May 8 00:54:01.225262 env[1234]: time="2025-05-08T00:54:01.225205355Z" level=error msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" failed" error="failed to destroy network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.225509 kubelet[2015]: E0508 00:54:01.225462 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:01.225570 kubelet[2015]: E0508 00:54:01.225522 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800"} May 8 00:54:01.225605 kubelet[2015]: E0508 00:54:01.225567 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c1860d0-9041-4cb5-8c0a-5201c4257215\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.225665 kubelet[2015]: E0508 00:54:01.225598 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c1860d0-9041-4cb5-8c0a-5201c4257215\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-j4dtk" podUID="5c1860d0-9041-4cb5-8c0a-5201c4257215" May 8 00:54:01.231757 env[1234]: time="2025-05-08T00:54:01.231689384Z" level=error msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" failed" error="failed to destroy network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.232188 kubelet[2015]: E0508 00:54:01.232028 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:01.232188 kubelet[2015]: E0508 00:54:01.232079 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4"} May 8 00:54:01.232188 kubelet[2015]: E0508 00:54:01.232113 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.232188 kubelet[2015]: E0508 00:54:01.232135 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" podUID="48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d" May 8 00:54:01.235523 env[1234]: time="2025-05-08T00:54:01.235484677Z" level=error msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" failed" error="failed to destroy network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.235702 kubelet[2015]: E0508 00:54:01.235671 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:01.235760 kubelet[2015]: E0508 00:54:01.235712 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97"} May 8 00:54:01.235760 kubelet[2015]: E0508 00:54:01.235744 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"56531f88-a3b4-4d98-a0d7-ed634d8f4930\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.235841 kubelet[2015]: E0508 00:54:01.235767 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"56531f88-a3b4-4d98-a0d7-ed634d8f4930\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" podUID="56531f88-a3b4-4d98-a0d7-ed634d8f4930" May 8 00:54:01.243132 env[1234]: time="2025-05-08T00:54:01.243075222Z" level=error msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" failed" error="failed to destroy network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:54:01.243367 kubelet[2015]: E0508 00:54:01.243339 2015 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:01.243447 kubelet[2015]: E0508 00:54:01.243385 2015 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693"} May 8 00:54:01.243447 kubelet[2015]: E0508 00:54:01.243413 2015 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4f6f1e7-458d-46ec-85c4-573c69c50507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:54:01.243447 kubelet[2015]: E0508 00:54:01.243431 2015 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4f6f1e7-458d-46ec-85c4-573c69c50507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" podUID="c4f6f1e7-458d-46ec-85c4-573c69c50507" May 8 00:54:02.713196 systemd[1]: Started sshd@8-10.0.0.137:22-10.0.0.1:49126.service. May 8 00:54:02.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.137:22-10.0.0.1:49126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:02.718393 kernel: kauditd_printk_skb: 45 callbacks suppressed May 8 00:54:02.718473 kernel: audit: type=1130 audit(1746665642.711:1012): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.137:22-10.0.0.1:49126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:02.752000 audit[3074]: USER_ACCT pid=3074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.756478 sshd[3074]: Accepted publickey for core from 10.0.0.1 port 49126 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:02.762000 audit[3074]: CRED_ACQ pid=3074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.764135 sshd[3074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:02.769607 systemd[1]: Started session-9.scope. May 8 00:54:02.770066 systemd-logind[1220]: New session 9 of user core. May 8 00:54:02.774554 kernel: audit: type=1101 audit(1746665642.752:1013): pid=3074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.774619 kernel: audit: type=1103 audit(1746665642.762:1014): pid=3074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.774644 kernel: audit: type=1006 audit(1746665642.762:1015): pid=3074 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 8 00:54:02.762000 audit[3074]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99654e00 a2=3 a3=0 items=0 ppid=1 pid=3074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:02.787496 kernel: audit: type=1300 audit(1746665642.762:1015): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99654e00 a2=3 a3=0 items=0 ppid=1 pid=3074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:02.787610 kernel: audit: type=1327 audit(1746665642.762:1015): proctitle=737368643A20636F7265205B707269765D May 8 00:54:02.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:02.773000 audit[3074]: USER_START pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.800725 kernel: audit: type=1105 audit(1746665642.773:1016): pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.800806 kernel: audit: type=1103 audit(1746665642.773:1017): pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.773000 audit[3076]: CRED_ACQ pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.897720 sshd[3074]: pam_unix(sshd:session): session closed for user core May 8 00:54:02.897000 audit[3074]: USER_END pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.899979 systemd[1]: sshd@8-10.0.0.137:22-10.0.0.1:49126.service: Deactivated successfully. May 8 00:54:02.900776 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:54:02.901755 systemd-logind[1220]: Session 9 logged out. Waiting for processes to exit. May 8 00:54:02.902442 systemd-logind[1220]: Removed session 9. May 8 00:54:02.897000 audit[3074]: CRED_DISP pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.908333 kernel: audit: type=1106 audit(1746665642.897:1018): pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.908412 kernel: audit: type=1104 audit(1746665642.897:1019): pid=3074 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:02.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.137:22-10.0.0.1:49126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:07.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.137:22-10.0.0.1:43106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:07.903063 systemd[1]: Started sshd@9-10.0.0.137:22-10.0.0.1:43106.service. May 8 00:54:07.904193 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:07.904559 kernel: audit: type=1130 audit(1746665647.902:1021): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.137:22-10.0.0.1:43106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:07.941000 audit[3092]: USER_ACCT pid=3092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.945000 audit[3092]: CRED_ACQ pid=3092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.945777 sshd[3092]: Accepted publickey for core from 10.0.0.1 port 43106 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:07.946174 sshd[3092]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:07.946425 kernel: audit: type=1101 audit(1746665647.941:1022): pid=3092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.946478 kernel: audit: type=1103 audit(1746665647.945:1023): pid=3092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.950720 systemd[1]: Started session-10.scope. May 8 00:54:07.951203 systemd-logind[1220]: New session 10 of user core. May 8 00:54:07.952047 kernel: audit: type=1006 audit(1746665647.945:1024): pid=3092 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 8 00:54:07.952100 kernel: audit: type=1300 audit(1746665647.945:1024): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff60d09900 a2=3 a3=0 items=0 ppid=1 pid=3092 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:07.945000 audit[3092]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff60d09900 a2=3 a3=0 items=0 ppid=1 pid=3092 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:07.957224 kernel: audit: type=1327 audit(1746665647.945:1024): proctitle=737368643A20636F7265205B707269765D May 8 00:54:07.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:07.955000 audit[3092]: USER_START pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.956000 audit[3094]: CRED_ACQ pid=3094 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.965056 kernel: audit: type=1105 audit(1746665647.955:1025): pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:07.965106 kernel: audit: type=1103 audit(1746665647.956:1026): pid=3094 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:08.120297 sshd[3092]: pam_unix(sshd:session): session closed for user core May 8 00:54:08.121000 audit[3092]: USER_END pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:08.122757 systemd[1]: sshd@9-10.0.0.137:22-10.0.0.1:43106.service: Deactivated successfully. May 8 00:54:08.200584 kernel: audit: type=1106 audit(1746665648.121:1027): pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:08.200712 kernel: audit: type=1104 audit(1746665648.121:1028): pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:08.121000 audit[3092]: CRED_DISP pid=3092 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:08.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.137:22-10.0.0.1:43106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:08.123459 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:54:08.129597 systemd-logind[1220]: Session 10 logged out. Waiting for processes to exit. May 8 00:54:08.130239 systemd-logind[1220]: Removed session 10. May 8 00:54:11.082618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1931468744.mount: Deactivated successfully. May 8 00:54:12.245591 env[1234]: time="2025-05-08T00:54:12.245535513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:12.250478 env[1234]: time="2025-05-08T00:54:12.250443319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:12.252167 env[1234]: time="2025-05-08T00:54:12.252126298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:12.255908 env[1234]: time="2025-05-08T00:54:12.255867528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:12.256556 env[1234]: time="2025-05-08T00:54:12.256522158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 8 00:54:12.265836 env[1234]: time="2025-05-08T00:54:12.264934870Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:54:12.292763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3246921471.mount: Deactivated successfully. May 8 00:54:12.302157 env[1234]: time="2025-05-08T00:54:12.302108847Z" level=info msg="CreateContainer within sandbox \"25a03195a4926ccd2f0ea80ad8241ae7c7aeea7c6d899648eed01c0b6139c3e2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"633e44dfe58289522acb50be21c792e8817e258647f7b501c0500085e5419ba5\"" May 8 00:54:12.302740 env[1234]: time="2025-05-08T00:54:12.302720694Z" level=info msg="StartContainer for \"633e44dfe58289522acb50be21c792e8817e258647f7b501c0500085e5419ba5\"" May 8 00:54:12.320949 systemd[1]: Started cri-containerd-633e44dfe58289522acb50be21c792e8817e258647f7b501c0500085e5419ba5.scope. May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1f206a02c0 items=0 ppid=2450 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:12.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336534346466653538323839353232616362353062653231633739 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit: BPF prog-id=136 op=LOAD May 8 00:54:12.338000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039ec38 items=0 ppid=2450 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:12.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336534346466653538323839353232616362353062653231633739 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit: BPF prog-id=137 op=LOAD May 8 00:54:12.338000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039ec88 items=0 ppid=2450 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:12.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336534346466653538323839353232616362353062653231633739 May 8 00:54:12.338000 audit: BPF prog-id=137 op=UNLOAD May 8 00:54:12.338000 audit: BPF prog-id=136 op=UNLOAD May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:12.338000 audit: BPF prog-id=138 op=LOAD May 8 00:54:12.338000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039ed18 items=0 ppid=2450 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:12.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336534346466653538323839353232616362353062653231633739 May 8 00:54:12.463572 env[1234]: time="2025-05-08T00:54:12.463515376Z" level=info msg="StartContainer for \"633e44dfe58289522acb50be21c792e8817e258647f7b501c0500085e5419ba5\" returns successfully" May 8 00:54:12.500916 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:54:12.501074 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:54:13.124187 systemd[1]: Started sshd@10-10.0.0.137:22-10.0.0.1:43116.service. May 8 00:54:13.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.137:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:13.171017 kernel: kauditd_printk_skb: 44 callbacks suppressed May 8 00:54:13.171094 kernel: audit: type=1130 audit(1746665653.123:1036): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.137:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:13.207358 kubelet[2015]: E0508 00:54:13.207325 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:13.499352 kubelet[2015]: I0508 00:54:13.499159 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dbmwv" podStartSLOduration=2.154813969 podStartE2EDuration="32.499128666s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:53:41.91304883 +0000 UTC m=+13.131398042" lastFinishedPulling="2025-05-08 00:54:12.257363537 +0000 UTC m=+43.475712739" observedRunningTime="2025-05-08 00:54:13.498950974 +0000 UTC m=+44.717300186" watchObservedRunningTime="2025-05-08 00:54:13.499128666 +0000 UTC m=+44.717477878" May 8 00:54:13.870061 env[1234]: time="2025-05-08T00:54:13.869702841Z" level=info msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" May 8 00:54:13.870061 env[1234]: time="2025-05-08T00:54:13.869726386Z" level=info msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" May 8 00:54:13.870061 env[1234]: time="2025-05-08T00:54:13.869916061Z" level=info msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" May 8 00:54:13.953000 audit[3168]: USER_ACCT pid=3168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.954711 sshd[3168]: Accepted publickey for core from 10.0.0.1 port 43116 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:13.957000 audit[3168]: CRED_ACQ pid=3168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.959207 sshd[3168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:13.962543 kernel: audit: type=1101 audit(1746665653.953:1037): pid=3168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.962623 kernel: audit: type=1103 audit(1746665653.957:1038): pid=3168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.962654 kernel: audit: type=1006 audit(1746665653.957:1039): pid=3168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 8 00:54:13.964729 kernel: audit: type=1300 audit(1746665653.957:1039): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38933850 a2=3 a3=0 items=0 ppid=1 pid=3168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:13.957000 audit[3168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38933850 a2=3 a3=0 items=0 ppid=1 pid=3168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:13.969077 kernel: audit: type=1327 audit(1746665653.957:1039): proctitle=737368643A20636F7265205B707269765D May 8 00:54:13.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:13.977710 systemd[1]: Started session-11.scope. May 8 00:54:13.978567 systemd-logind[1220]: New session 11 of user core. May 8 00:54:14.010188 kernel: audit: type=1105 audit(1746665653.992:1040): pid=3168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.010419 kernel: audit: type=1103 audit(1746665653.996:1041): pid=3284 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.992000 audit[3168]: USER_START pid=3168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:13.996000 audit[3284]: CRED_ACQ pid=3284 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" iface="eth0" netns="/var/run/netns/cni-c9883be6-758e-c36e-1532-8038ffeb4b83" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" iface="eth0" netns="/var/run/netns/cni-c9883be6-758e-c36e-1532-8038ffeb4b83" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" iface="eth0" netns="/var/run/netns/cni-c9883be6-758e-c36e-1532-8038ffeb4b83" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:13.993 [INFO][3240] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.070 [INFO][3293] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.070 [INFO][3293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.071 [INFO][3293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.077 [WARNING][3293] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.077 [INFO][3293] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.078 [INFO][3293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.087558 env[1234]: 2025-05-08 00:54:14.080 [INFO][3240] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:14.089703 systemd[1]: run-netns-cni\x2dc9883be6\x2d758e\x2dc36e\x2d1532\x2d8038ffeb4b83.mount: Deactivated successfully. May 8 00:54:14.090033 env[1234]: time="2025-05-08T00:54:14.089980624Z" level=info msg="TearDown network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" successfully" May 8 00:54:14.090135 env[1234]: time="2025-05-08T00:54:14.090113559Z" level=info msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" returns successfully" May 8 00:54:14.090921 env[1234]: time="2025-05-08T00:54:14.090897325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j4dtk,Uid:5c1860d0-9041-4cb5-8c0a-5201c4257215,Namespace:calico-system,Attempt:1,}" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.977 [INFO][3245] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.977 [INFO][3245] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" iface="eth0" netns="/var/run/netns/cni-4d4facd0-eda6-2eeb-ba6a-34816491711f" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.977 [INFO][3245] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" iface="eth0" netns="/var/run/netns/cni-4d4facd0-eda6-2eeb-ba6a-34816491711f" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.978 [INFO][3245] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" iface="eth0" netns="/var/run/netns/cni-4d4facd0-eda6-2eeb-ba6a-34816491711f" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.978 [INFO][3245] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:13.978 [INFO][3245] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.072 [INFO][3275] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.077 [INFO][3275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.078 [INFO][3275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.089 [WARNING][3275] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.089 [INFO][3275] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.090 [INFO][3275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.093086 env[1234]: 2025-05-08 00:54:14.091 [INFO][3245] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:14.095684 env[1234]: time="2025-05-08T00:54:14.095644480Z" level=info msg="TearDown network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" successfully" May 8 00:54:14.095804 env[1234]: time="2025-05-08T00:54:14.095758619Z" level=info msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" returns successfully" May 8 00:54:14.095877 systemd[1]: run-netns-cni\x2d4d4facd0\x2deda6\x2d2eeb\x2dba6a\x2d34816491711f.mount: Deactivated successfully. May 8 00:54:14.096518 env[1234]: time="2025-05-08T00:54:14.096280732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-zhsrj,Uid:56531f88-a3b4-4d98-a0d7-ed634d8f4930,Namespace:calico-apiserver,Attempt:1,}" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" iface="eth0" netns="/var/run/netns/cni-34e301a1-b760-26eb-da0c-55d9029d488a" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" iface="eth0" netns="/var/run/netns/cni-34e301a1-b760-26eb-da0c-55d9029d488a" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" iface="eth0" netns="/var/run/netns/cni-34e301a1-b760-26eb-da0c-55d9029d488a" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:13.986 [INFO][3246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.075 [INFO][3283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.077 [INFO][3283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.092 [INFO][3283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.101 [WARNING][3283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.102 [INFO][3283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.103 [INFO][3283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.108002 env[1234]: 2025-05-08 00:54:14.106 [INFO][3246] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:14.109045 env[1234]: time="2025-05-08T00:54:14.109000050Z" level=info msg="TearDown network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" successfully" May 8 00:54:14.109105 env[1234]: time="2025-05-08T00:54:14.109051378Z" level=info msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" returns successfully" May 8 00:54:14.109874 kubelet[2015]: E0508 00:54:14.109433 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:14.110723 env[1234]: time="2025-05-08T00:54:14.110666843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7bm9,Uid:878f6d96-6e02-4a11-9fcf-a72dfc3b7541,Namespace:kube-system,Attempt:1,}" May 8 00:54:14.111223 systemd[1]: run-netns-cni\x2d34e301a1\x2db760\x2d26eb\x2dda0c\x2d55d9029d488a.mount: Deactivated successfully. May 8 00:54:14.130581 sshd[3168]: pam_unix(sshd:session): session closed for user core May 8 00:54:14.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.137:22-10.0.0.1:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.133904 systemd[1]: Started sshd@11-10.0.0.137:22-10.0.0.1:43122.service. May 8 00:54:14.138415 kernel: audit: type=1130 audit(1746665654.132:1042): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.137:22-10.0.0.1:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.139000 audit[3168]: USER_END pid=3168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.146489 kernel: audit: type=1106 audit(1746665654.139:1043): pid=3168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.144000 audit[3168]: CRED_DISP pid=3168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.137:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.147539 systemd[1]: sshd@10-10.0.0.137:22-10.0.0.1:43116.service: Deactivated successfully. May 8 00:54:14.148318 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:54:14.150067 systemd-logind[1220]: Session 11 logged out. Waiting for processes to exit. May 8 00:54:14.151024 systemd-logind[1220]: Removed session 11. May 8 00:54:14.188332 sshd[3332]: Accepted publickey for core from 10.0.0.1 port 43122 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:14.189762 sshd[3332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:14.186000 audit[3332]: USER_ACCT pid=3332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.187000 audit[3332]: CRED_ACQ pid=3332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.187000 audit[3332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa647570 a2=3 a3=0 items=0 ppid=1 pid=3332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.187000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:14.194546 systemd[1]: Started session-12.scope. May 8 00:54:14.194995 systemd-logind[1220]: New session 12 of user core. May 8 00:54:14.197000 audit[3332]: USER_START pid=3332 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.199000 audit[3365]: CRED_ACQ pid=3365 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.209395 kubelet[2015]: E0508 00:54:14.209349 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:14.375161 sshd[3332]: pam_unix(sshd:session): session closed for user core May 8 00:54:14.375000 audit[3332]: USER_END pid=3332 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.375000 audit[3332]: CRED_DISP pid=3332 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.137:22-10.0.0.1:43138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.137:22-10.0.0.1:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.378827 systemd[1]: Started sshd@12-10.0.0.137:22-10.0.0.1:43138.service. May 8 00:54:14.379451 systemd[1]: sshd@11-10.0.0.137:22-10.0.0.1:43122.service: Deactivated successfully. May 8 00:54:14.380432 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:54:14.382236 systemd-logind[1220]: Session 12 logged out. Waiting for processes to exit. May 8 00:54:14.385188 systemd-logind[1220]: Removed session 12. May 8 00:54:14.415000 audit[3425]: USER_ACCT pid=3425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.416784 sshd[3425]: Accepted publickey for core from 10.0.0.1 port 43138 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:14.416000 audit[3425]: CRED_ACQ pid=3425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.416000 audit[3425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c76d160 a2=3 a3=0 items=0 ppid=1 pid=3425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:14.418224 sshd[3425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:14.422424 systemd-logind[1220]: New session 13 of user core. May 8 00:54:14.423362 systemd[1]: Started session-13.scope. May 8 00:54:14.429280 systemd-networkd[1043]: calid5435118ed2: Link UP May 8 00:54:14.432090 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:54:14.432221 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5435118ed2: link becomes ready May 8 00:54:14.432115 systemd-networkd[1043]: calid5435118ed2: Gained carrier May 8 00:54:14.436000 audit[3425]: USER_START pid=3425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.437000 audit[3431]: CRED_ACQ pid=3431 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.175 [INFO][3320] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.226 [INFO][3320] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0 calico-apiserver-5fd85c86c- calico-apiserver 56531f88-a3b4-4d98-a0d7-ed634d8f4930 913 0 2025-05-08 00:53:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fd85c86c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5fd85c86c-zhsrj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid5435118ed2 [] []}} ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.226 [INFO][3320] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.284 [INFO][3395] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" HandleID="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.299 [INFO][3395] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" HandleID="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012a2b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5fd85c86c-zhsrj", "timestamp":"2025-05-08 00:54:14.284641521 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.300 [INFO][3395] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.300 [INFO][3395] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.300 [INFO][3395] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.302 [INFO][3395] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.388 [INFO][3395] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.400 [INFO][3395] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.402 [INFO][3395] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.404 [INFO][3395] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.404 [INFO][3395] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.405 [INFO][3395] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441 May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.410 [INFO][3395] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.414 [INFO][3395] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.414 [INFO][3395] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" host="localhost" May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.414 [INFO][3395] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.451243 env[1234]: 2025-05-08 00:54:14.414 [INFO][3395] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" HandleID="k8s-pod-network.118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.419 [INFO][3320] cni-plugin/k8s.go 386: Populated endpoint ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"56531f88-a3b4-4d98-a0d7-ed634d8f4930", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5fd85c86c-zhsrj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5435118ed2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.420 [INFO][3320] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.420 [INFO][3320] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid5435118ed2 ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.433 [INFO][3320] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.433 [INFO][3320] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"56531f88-a3b4-4d98-a0d7-ed634d8f4930", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441", Pod:"calico-apiserver-5fd85c86c-zhsrj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5435118ed2", MAC:"ce:fd:92:b6:1c:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.452237 env[1234]: 2025-05-08 00:54:14.449 [INFO][3320] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-zhsrj" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:14.470105 env[1234]: time="2025-05-08T00:54:14.470042491Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:14.470290 env[1234]: time="2025-05-08T00:54:14.470082688Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:14.470290 env[1234]: time="2025-05-08T00:54:14.470093279Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:14.470290 env[1234]: time="2025-05-08T00:54:14.470210163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441 pid=3450 runtime=io.containerd.runc.v2 May 8 00:54:14.486033 systemd[1]: Started cri-containerd-118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441.scope. May 8 00:54:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.505000 audit: BPF prog-id=139 op=LOAD May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3450 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383930356463373065336265323534386131386338356361353732 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3450 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383930356463373065336265323534386131386338356361353732 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit: BPF prog-id=140 op=LOAD May 8 00:54:14.506000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027c870 items=0 ppid=3450 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383930356463373065336265323534386131386338356361353732 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit: BPF prog-id=141 op=LOAD May 8 00:54:14.506000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027c8b8 items=0 ppid=3450 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383930356463373065336265323534386131386338356361353732 May 8 00:54:14.506000 audit: BPF prog-id=141 op=UNLOAD May 8 00:54:14.506000 audit: BPF prog-id=140 op=UNLOAD May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.506000 audit: BPF prog-id=142 op=LOAD May 8 00:54:14.506000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027ccc8 items=0 ppid=3450 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383930356463373065336265323534386131386338356361353732 May 8 00:54:14.508451 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:14.519651 systemd-networkd[1043]: caliba535ba2089: Link UP May 8 00:54:14.526849 systemd-networkd[1043]: caliba535ba2089: Gained carrier May 8 00:54:14.527394 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba535ba2089: link becomes ready May 8 00:54:14.538246 env[1234]: time="2025-05-08T00:54:14.538203520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-zhsrj,Uid:56531f88-a3b4-4d98-a0d7-ed634d8f4930,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441\"" May 8 00:54:14.540219 env[1234]: time="2025-05-08T00:54:14.540196751Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.212 [INFO][3344] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.225 [INFO][3344] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0 coredns-6f6b679f8f- kube-system 878f6d96-6e02-4a11-9fcf-a72dfc3b7541 914 0 2025-05-08 00:53:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-k7bm9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliba535ba2089 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.225 [INFO][3344] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.280 [INFO][3386] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" HandleID="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.300 [INFO][3386] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" HandleID="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051df0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-k7bm9", "timestamp":"2025-05-08 00:54:14.280221095 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.301 [INFO][3386] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.414 [INFO][3386] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.414 [INFO][3386] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.416 [INFO][3386] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.494 [INFO][3386] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.498 [INFO][3386] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.500 [INFO][3386] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.502 [INFO][3386] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.502 [INFO][3386] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.503 [INFO][3386] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.507 [INFO][3386] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.513 [INFO][3386] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.513 [INFO][3386] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" host="localhost" May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.513 [INFO][3386] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.741110 env[1234]: 2025-05-08 00:54:14.513 [INFO][3386] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" HandleID="k8s-pod-network.b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.516 [INFO][3344] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"878f6d96-6e02-4a11-9fcf-a72dfc3b7541", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-k7bm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba535ba2089", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.516 [INFO][3344] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.516 [INFO][3344] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba535ba2089 ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.527 [INFO][3344] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.527 [INFO][3344] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"878f6d96-6e02-4a11-9fcf-a72dfc3b7541", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a", Pod:"coredns-6f6b679f8f-k7bm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba535ba2089", MAC:"72:5f:0f:4c:16:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.741921 env[1234]: 2025-05-08 00:54:14.739 [INFO][3344] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7bm9" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:14.743003 sshd[3425]: pam_unix(sshd:session): session closed for user core May 8 00:54:14.743000 audit[3425]: USER_END pid=3425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.743000 audit[3425]: CRED_DISP pid=3425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:14.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.137:22-10.0.0.1:43138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.746388 systemd[1]: sshd@12-10.0.0.137:22-10.0.0.1:43138.service: Deactivated successfully. May 8 00:54:14.747069 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:54:14.747715 systemd-logind[1220]: Session 13 logged out. Waiting for processes to exit. May 8 00:54:14.748695 systemd-logind[1220]: Removed session 13. May 8 00:54:14.833491 systemd-networkd[1043]: cali9a70e0fdf3d: Link UP May 8 00:54:14.834851 systemd-networkd[1043]: cali9a70e0fdf3d: Gained carrier May 8 00:54:14.835392 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a70e0fdf3d: link becomes ready May 8 00:54:14.869837 env[1234]: time="2025-05-08T00:54:14.869786630Z" level=info msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" May 8 00:54:14.870296 env[1234]: time="2025-05-08T00:54:14.869876142Z" level=info msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" May 8 00:54:14.912941 env[1234]: time="2025-05-08T00:54:14.912838337Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:14.912941 env[1234]: time="2025-05-08T00:54:14.912893103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:14.913171 env[1234]: time="2025-05-08T00:54:14.912933350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:14.913238 env[1234]: time="2025-05-08T00:54:14.913173532Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a pid=3562 runtime=io.containerd.runc.v2 May 8 00:54:14.926332 systemd[1]: Started cri-containerd-b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a.scope. May 8 00:54:14.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.934000 audit: BPF prog-id=143 op=LOAD May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.181 [INFO][3331] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.221 [INFO][3331] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--j4dtk-eth0 csi-node-driver- calico-system 5c1860d0-9041-4cb5-8c0a-5201c4257215 915 0 2025-05-08 00:53:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-j4dtk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9a70e0fdf3d [] []}} ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.221 [INFO][3331] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.308 [INFO][3392] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" HandleID="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.492 [INFO][3392] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" HandleID="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00043f2d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-j4dtk", "timestamp":"2025-05-08 00:54:14.308421597 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.492 [INFO][3392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.513 [INFO][3392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.514 [INFO][3392] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.516 [INFO][3392] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.738 [INFO][3392] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.744 [INFO][3392] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.746 [INFO][3392] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.749 [INFO][3392] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.749 [INFO][3392] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.750 [INFO][3392] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8 May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.809 [INFO][3392] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.829 [INFO][3392] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.830 [INFO][3392] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" host="localhost" May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.830 [INFO][3392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:14.936914 env[1234]: 2025-05-08 00:54:14.830 [INFO][3392] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" HandleID="k8s-pod-network.fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.832 [INFO][3331] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--j4dtk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c1860d0-9041-4cb5-8c0a-5201c4257215", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-j4dtk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a70e0fdf3d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.832 [INFO][3331] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.832 [INFO][3331] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9a70e0fdf3d ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.834 [INFO][3331] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.835 [INFO][3331] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--j4dtk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c1860d0-9041-4cb5-8c0a-5201c4257215", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8", Pod:"csi-node-driver-j4dtk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a70e0fdf3d", MAC:"e2:dc:96:92:97:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:14.937484 env[1234]: 2025-05-08 00:54:14.932 [INFO][3331] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8" Namespace="calico-system" Pod="csi-node-driver-j4dtk" WorkloadEndpoint="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3562 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636532326538373461346234646165343132313634643166303934 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3562 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636532326538373461346234646165343132313634643166303934 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit: BPF prog-id=144 op=LOAD May 8 00:54:14.936000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000995f0 items=0 ppid=3562 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636532326538373461346234646165343132313634643166303934 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.936000 audit: BPF prog-id=145 op=LOAD May 8 00:54:14.936000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099638 items=0 ppid=3562 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636532326538373461346234646165343132313634643166303934 May 8 00:54:14.936000 audit: BPF prog-id=145 op=UNLOAD May 8 00:54:14.936000 audit: BPF prog-id=144 op=UNLOAD May 8 00:54:14.937000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:14.937000 audit: BPF prog-id=146 op=LOAD May 8 00:54:14.937000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099a48 items=0 ppid=3562 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:14.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636532326538373461346234646165343132313634643166303934 May 8 00:54:14.939013 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:14.960428 env[1234]: time="2025-05-08T00:54:14.960367982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7bm9,Uid:878f6d96-6e02-4a11-9fcf-a72dfc3b7541,Namespace:kube-system,Attempt:1,} returns sandbox id \"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a\"" May 8 00:54:14.961289 kubelet[2015]: E0508 00:54:14.961264 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:14.963057 env[1234]: time="2025-05-08T00:54:14.963025259Z" level=info msg="CreateContainer within sandbox \"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:54:14.989599 env[1234]: time="2025-05-08T00:54:14.989527858Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:14.989785 env[1234]: time="2025-05-08T00:54:14.989568576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:14.989785 env[1234]: time="2025-05-08T00:54:14.989579217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:14.989991 env[1234]: time="2025-05-08T00:54:14.989781275Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8 pid=3613 runtime=io.containerd.runc.v2 May 8 00:54:15.007098 systemd[1]: Started cri-containerd-fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8.scope. May 8 00:54:15.033000 audit[3689]: AVC avc: denied { write } for pid=3689 comm="tee" name="fd" dev="proc" ino=25425 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.033000 audit[3689]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcb7e0a1b a2=241 a3=1b6 items=1 ppid=3651 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.033000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:54:15.033000 audit: PATH item=0 name="/dev/fd/63" inode=26187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.033000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit[3722]: AVC avc: denied { write } for pid=3722 comm="tee" name="fd" dev="proc" ino=26198 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.040000 audit: BPF prog-id=147 op=LOAD May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3613 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353232346136666164343938626630393063376336373237363966 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3613 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353232346136666164343938626630393063376336373237363966 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit: BPF prog-id=148 op=LOAD May 8 00:54:15.042000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000277e90 items=0 ppid=3613 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353232346136666164343938626630393063376336373237363966 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit: BPF prog-id=149 op=LOAD May 8 00:54:15.042000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000277ed8 items=0 ppid=3613 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353232346136666164343938626630393063376336373237363966 May 8 00:54:15.042000 audit: BPF prog-id=149 op=UNLOAD May 8 00:54:15.042000 audit: BPF prog-id=148 op=UNLOAD May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.042000 audit: BPF prog-id=150 op=LOAD May 8 00:54:15.042000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d02e8 items=0 ppid=3613 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353232346136666164343938626630393063376336373237363966 May 8 00:54:15.040000 audit[3722]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1546ba2c a2=241 a3=1b6 items=1 ppid=3658 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.040000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:54:15.040000 audit: PATH item=0 name="/dev/fd/63" inode=24372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.045000 audit[3724]: AVC avc: denied { write } for pid=3724 comm="tee" name="fd" dev="proc" ino=26202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.045000 audit[3724]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdf25ea2a a2=241 a3=1b6 items=1 ppid=3637 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.046000 audit[3676]: AVC avc: denied { write } for pid=3676 comm="tee" name="fd" dev="proc" ino=25439 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.046000 audit[3676]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe22956a2b a2=241 a3=1b6 items=1 ppid=3633 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.046000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:54:15.046000 audit: PATH item=0 name="/dev/fd/63" inode=24351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.045000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:54:15.045000 audit: PATH item=0 name="/dev/fd/63" inode=26195 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.050677 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:15.068000 audit[3736]: AVC avc: denied { write } for pid=3736 comm="tee" name="fd" dev="proc" ino=24378 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.068000 audit[3736]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3ca4a2a a2=241 a3=1b6 items=1 ppid=3643 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.068000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:54:15.068000 audit: PATH item=0 name="/dev/fd/63" inode=25443 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.070000 audit[3708]: AVC avc: denied { write } for pid=3708 comm="tee" name="fd" dev="proc" ino=24382 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.070000 audit[3708]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeff273a1a a2=241 a3=1b6 items=1 ppid=3636 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.070000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:54:15.070000 audit: PATH item=0 name="/dev/fd/63" inode=25409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.071000 audit[3712]: AVC avc: denied { write } for pid=3712 comm="tee" name="fd" dev="proc" ino=26680 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:54:15.071000 audit[3712]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd51573a2a a2=241 a3=1b6 items=1 ppid=3655 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.071000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:54:15.071000 audit: PATH item=0 name="/dev/fd/63" inode=25414 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:54:15.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:54:15.087196 env[1234]: time="2025-05-08T00:54:15.087133625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j4dtk,Uid:5c1860d0-9041-4cb5-8c0a-5201c4257215,Namespace:calico-system,Attempt:1,} returns sandbox id \"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8\"" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.013 [INFO][3541] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.013 [INFO][3541] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" iface="eth0" netns="/var/run/netns/cni-91357519-f1b7-ddf3-6c02-f7bb77e16046" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.013 [INFO][3541] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" iface="eth0" netns="/var/run/netns/cni-91357519-f1b7-ddf3-6c02-f7bb77e16046" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.014 [INFO][3541] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" iface="eth0" netns="/var/run/netns/cni-91357519-f1b7-ddf3-6c02-f7bb77e16046" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.014 [INFO][3541] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.014 [INFO][3541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.054 [INFO][3683] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.054 [INFO][3683] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.057 [INFO][3683] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.242 [WARNING][3683] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.242 [INFO][3683] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.244 [INFO][3683] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:15.247906 env[1234]: 2025-05-08 00:54:15.246 [INFO][3541] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:15.248633 env[1234]: time="2025-05-08T00:54:15.248591526Z" level=info msg="TearDown network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" successfully" May 8 00:54:15.248726 env[1234]: time="2025-05-08T00:54:15.248703521Z" level=info msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" returns successfully" May 8 00:54:15.249167 kubelet[2015]: E0508 00:54:15.249133 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:15.249791 env[1234]: time="2025-05-08T00:54:15.249768557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-m8b6z,Uid:f711de22-a49e-4bb2-afd9-4f662b0e29ae,Namespace:kube-system,Attempt:1,}" May 8 00:54:15.264356 systemd[1]: run-netns-cni\x2d91357519\x2df1b7\x2dddf3\x2d6c02\x2df7bb77e16046.mount: Deactivated successfully. May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" iface="eth0" netns="/var/run/netns/cni-d14c1d60-c8d9-a91c-8c60-9ed8c0ab0c52" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" iface="eth0" netns="/var/run/netns/cni-d14c1d60-c8d9-a91c-8c60-9ed8c0ab0c52" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" iface="eth0" netns="/var/run/netns/cni-d14c1d60-c8d9-a91c-8c60-9ed8c0ab0c52" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.012 [INFO][3540] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.073 [INFO][3681] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.073 [INFO][3681] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.244 [INFO][3681] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.288 [WARNING][3681] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.288 [INFO][3681] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.289 [INFO][3681] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:15.292673 env[1234]: 2025-05-08 00:54:15.291 [INFO][3540] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:15.294936 systemd[1]: run-netns-cni\x2dd14c1d60\x2dc8d9\x2da91c\x2d8c60\x2d9ed8c0ab0c52.mount: Deactivated successfully. May 8 00:54:15.295784 env[1234]: time="2025-05-08T00:54:15.295621512Z" level=info msg="TearDown network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" successfully" May 8 00:54:15.295784 env[1234]: time="2025-05-08T00:54:15.295660797Z" level=info msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" returns successfully" May 8 00:54:15.296481 env[1234]: time="2025-05-08T00:54:15.296452147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-7n8xg,Uid:48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d,Namespace:calico-apiserver,Attempt:1,}" May 8 00:54:15.441000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.441000 audit: BPF prog-id=151 op=LOAD May 8 00:54:15.441000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffbf62130 a2=98 a3=3 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.442000 audit: BPF prog-id=151 op=UNLOAD May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit: BPF prog-id=152 op=LOAD May 8 00:54:15.442000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffbf61f10 a2=74 a3=540051 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.442000 audit: BPF prog-id=152 op=UNLOAD May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.442000 audit: BPF prog-id=153 op=LOAD May 8 00:54:15.442000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffbf61f40 a2=94 a3=2 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.442000 audit: BPF prog-id=153 op=UNLOAD May 8 00:54:15.552000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit: BPF prog-id=154 op=LOAD May 8 00:54:15.552000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffbf61e00 a2=40 a3=1 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.552000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.552000 audit: BPF prog-id=154 op=UNLOAD May 8 00:54:15.552000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.552000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffffbf61ed0 a2=50 a3=7ffffbf61fb0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.552000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61e10 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffbf61e40 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffbf61d50 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61e60 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61e40 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61e30 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61e60 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffbf61e40 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffbf61e60 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffbf61e30 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffbf61ea0 a2=28 a3=0 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffbf61c50 a2=50 a3=1 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit: BPF prog-id=155 op=LOAD May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffffbf61c50 a2=94 a3=5 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit: BPF prog-id=155 op=UNLOAD May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffbf61d00 a2=50 a3=1 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffffbf61e20 a2=4 a3=38 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { confidentiality } for pid=3820 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffbf61e70 a2=94 a3=6 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.560000 audit[3820]: AVC avc: denied { confidentiality } for pid=3820 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.560000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffbf61620 a2=94 a3=83 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.561000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.561000 audit[3820]: AVC avc: denied { confidentiality } for pid=3820 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.561000 audit[3820]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffbf61620 a2=94 a3=83 items=0 ppid=3656 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.561000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit: BPF prog-id=156 op=LOAD May 8 00:54:15.568000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff732de8c0 a2=98 a3=1999999999999999 items=0 ppid=3656 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.568000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:54:15.568000 audit: BPF prog-id=156 op=UNLOAD May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit: BPF prog-id=157 op=LOAD May 8 00:54:15.568000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff732de7a0 a2=74 a3=ffff items=0 ppid=3656 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.568000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:54:15.568000 audit: BPF prog-id=157 op=UNLOAD May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.568000 audit: BPF prog-id=158 op=LOAD May 8 00:54:15.568000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff732de7e0 a2=40 a3=7fff732de9c0 items=0 ppid=3656 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.568000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:54:15.568000 audit: BPF prog-id=158 op=UNLOAD May 8 00:54:15.619674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2469831101.mount: Deactivated successfully. May 8 00:54:15.623930 systemd-networkd[1043]: vxlan.calico: Link UP May 8 00:54:15.623939 systemd-networkd[1043]: vxlan.calico: Gained carrier May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit: BPF prog-id=159 op=LOAD May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb34ed7f0 a2=98 a3=ffffffff items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit: BPF prog-id=159 op=UNLOAD May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit: BPF prog-id=160 op=LOAD May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb34ed600 a2=74 a3=540051 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit: BPF prog-id=160 op=UNLOAD May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit: BPF prog-id=161 op=LOAD May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb34ed630 a2=94 a3=2 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit: BPF prog-id=161 op=UNLOAD May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed500 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb34ed530 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb34ed440 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed550 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed530 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed520 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed550 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb34ed530 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb34ed550 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb34ed520 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb34ed590 a2=28 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.638000 audit: BPF prog-id=162 op=LOAD May 8 00:54:15.638000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb34ed400 a2=40 a3=0 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.639000 audit: BPF prog-id=162 op=UNLOAD May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcb34ed3f0 a2=50 a3=2800 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcb34ed3f0 a2=50 a3=2800 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit: BPF prog-id=163 op=LOAD May 8 00:54:15.639000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb34ecc10 a2=94 a3=2 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.639000 audit: BPF prog-id=163 op=UNLOAD May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { perfmon } for pid=3849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit[3849]: AVC avc: denied { bpf } for pid=3849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.639000 audit: BPF prog-id=164 op=LOAD May 8 00:54:15.639000 audit[3849]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb34ecd10 a2=94 a3=30 items=0 ppid=3656 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit: BPF prog-id=165 op=LOAD May 8 00:54:15.645000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff67d75cd0 a2=98 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.645000 audit: BPF prog-id=165 op=UNLOAD May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.645000 audit: BPF prog-id=166 op=LOAD May 8 00:54:15.645000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff67d75ab0 a2=74 a3=540051 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.646000 audit: BPF prog-id=166 op=UNLOAD May 8 00:54:15.646000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.646000 audit: BPF prog-id=167 op=LOAD May 8 00:54:15.646000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff67d75ae0 a2=94 a3=2 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.646000 audit: BPF prog-id=167 op=UNLOAD May 8 00:54:15.677966 env[1234]: time="2025-05-08T00:54:15.677904667Z" level=info msg="CreateContainer within sandbox \"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6f6e153e493a0ffa55cf71b9f893f7cbd213d43cf89367be03ecaef1b4370133\"" May 8 00:54:15.679677 env[1234]: time="2025-05-08T00:54:15.678625521Z" level=info msg="StartContainer for \"6f6e153e493a0ffa55cf71b9f893f7cbd213d43cf89367be03ecaef1b4370133\"" May 8 00:54:15.698628 systemd[1]: Started cri-containerd-6f6e153e493a0ffa55cf71b9f893f7cbd213d43cf89367be03ecaef1b4370133.scope. May 8 00:54:15.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.730000 audit: BPF prog-id=168 op=LOAD May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3562 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366531353365343933613066666135356366373162396638393366 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3562 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366531353365343933613066666135356366373162396638393366 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit: BPF prog-id=169 op=LOAD May 8 00:54:15.731000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e7d40 items=0 ppid=3562 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366531353365343933613066666135356366373162396638393366 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit: BPF prog-id=170 op=LOAD May 8 00:54:15.731000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e7d88 items=0 ppid=3562 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366531353365343933613066666135356366373162396638393366 May 8 00:54:15.731000 audit: BPF prog-id=170 op=UNLOAD May 8 00:54:15.731000 audit: BPF prog-id=169 op=UNLOAD May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { perfmon } for pid=3867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit[3867]: AVC avc: denied { bpf } for pid=3867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.731000 audit: BPF prog-id=171 op=LOAD May 8 00:54:15.731000 audit[3867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b6198 items=0 ppid=3562 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366531353365343933613066666135356366373162396638393366 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit: BPF prog-id=172 op=LOAD May 8 00:54:15.756000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff67d759a0 a2=40 a3=1 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.756000 audit: BPF prog-id=172 op=UNLOAD May 8 00:54:15.756000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.756000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff67d75a70 a2=50 a3=7fff67d75b50 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d759b0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff67d759e0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff67d758f0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d75a00 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d759e0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d759d0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d75a00 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff67d759e0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff67d75a00 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff67d759d0 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff67d75a40 a2=28 a3=0 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff67d757f0 a2=50 a3=1 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit: BPF prog-id=173 op=LOAD May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff67d757f0 a2=94 a3=5 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit: BPF prog-id=173 op=UNLOAD May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff67d758a0 a2=50 a3=1 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff67d759c0 a2=4 a3=38 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { confidentiality } for pid=3853 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff67d75a10 a2=94 a3=6 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.764000 audit[3853]: AVC avc: denied { confidentiality } for pid=3853 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.764000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff67d751c0 a2=94 a3=83 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { confidentiality } for pid=3853 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:54:15.765000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff67d751c0 a2=94 a3=83 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff67d76c00 a2=10 a3=208 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff67d76aa0 a2=10 a3=3 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff67d76a40 a2=10 a3=3 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.765000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:15.765000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff67d76a40 a2=10 a3=7 items=0 ppid=3656 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:54:15.775000 audit: BPF prog-id=164 op=UNLOAD May 8 00:54:15.784490 systemd-networkd[1043]: caliba535ba2089: Gained IPv6LL May 8 00:54:15.853000 audit[3933]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:15.853000 audit[3933]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd3d61ee60 a2=0 a3=7ffd3d61ee4c items=0 ppid=3656 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:15.861000 audit[3932]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:15.861000 audit[3932]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd19909dd0 a2=0 a3=7ffd19909dbc items=0 ppid=3656 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.861000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:15.866000 audit[3931]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:15.866000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe3cb9fc60 a2=0 a3=7ffe3cb9fc4c items=0 ppid=3656 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.866000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:15.866000 audit[3934]: NETFILTER_CFG table=filter:100 family=2 entries=135 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:15.869301 env[1234]: time="2025-05-08T00:54:15.869242911Z" level=info msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" May 8 00:54:15.866000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=75620 a0=3 a1=7ffe1e39f5e0 a2=0 a3=55ae24318000 items=0 ppid=3656 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:15.866000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:15.882936 env[1234]: time="2025-05-08T00:54:15.882880446Z" level=info msg="StartContainer for \"6f6e153e493a0ffa55cf71b9f893f7cbd213d43cf89367be03ecaef1b4370133\" returns successfully" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.927 [INFO][3960] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.928 [INFO][3960] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" iface="eth0" netns="/var/run/netns/cni-48b51ab8-5f45-de63-9539-a7efc3751bc8" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.928 [INFO][3960] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" iface="eth0" netns="/var/run/netns/cni-48b51ab8-5f45-de63-9539-a7efc3751bc8" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.928 [INFO][3960] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" iface="eth0" netns="/var/run/netns/cni-48b51ab8-5f45-de63-9539-a7efc3751bc8" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.928 [INFO][3960] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.928 [INFO][3960] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.966 [INFO][3984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.966 [INFO][3984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.969 [INFO][3984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.975 [WARNING][3984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.976 [INFO][3984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.978 [INFO][3984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:15.981916 env[1234]: 2025-05-08 00:54:15.980 [INFO][3960] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:15.982997 env[1234]: time="2025-05-08T00:54:15.982095570Z" level=info msg="TearDown network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" successfully" May 8 00:54:15.982997 env[1234]: time="2025-05-08T00:54:15.982144936Z" level=info msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" returns successfully" May 8 00:54:15.984245 env[1234]: time="2025-05-08T00:54:15.983006601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7845dcc4b7-6v7qf,Uid:c4f6f1e7-458d-46ec-85c4-573c69c50507,Namespace:calico-system,Attempt:1,}" May 8 00:54:16.006837 systemd-networkd[1043]: calib2c90e9dbc3: Link UP May 8 00:54:16.009453 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib2c90e9dbc3: link becomes ready May 8 00:54:16.009050 systemd-networkd[1043]: calib2c90e9dbc3: Gained carrier May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.921 [INFO][3913] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0 coredns-6f6b679f8f- kube-system f711de22-a49e-4bb2-afd9-4f662b0e29ae 947 0 2025-05-08 00:53:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-m8b6z eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib2c90e9dbc3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.921 [INFO][3913] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.967 [INFO][3990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" HandleID="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.978 [INFO][3990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" HandleID="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000434ab0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-m8b6z", "timestamp":"2025-05-08 00:54:15.967032457 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.978 [INFO][3990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.978 [INFO][3990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.978 [INFO][3990] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.982 [INFO][3990] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.986 [INFO][3990] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.989 [INFO][3990] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.991 [INFO][3990] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.993 [INFO][3990] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.993 [INFO][3990] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.994 [INFO][3990] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504 May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:15.998 [INFO][3990] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:16.002 [INFO][3990] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:16.002 [INFO][3990] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" host="localhost" May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:16.002 [INFO][3990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:16.022190 env[1234]: 2025-05-08 00:54:16.002 [INFO][3990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" HandleID="k8s-pod-network.fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.004 [INFO][3913] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f711de22-a49e-4bb2-afd9-4f662b0e29ae", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-m8b6z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib2c90e9dbc3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.004 [INFO][3913] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.004 [INFO][3913] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib2c90e9dbc3 ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.009 [INFO][3913] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.010 [INFO][3913] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f711de22-a49e-4bb2-afd9-4f662b0e29ae", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504", Pod:"coredns-6f6b679f8f-m8b6z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib2c90e9dbc3", MAC:"06:e8:34:ce:10:b2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.022962 env[1234]: 2025-05-08 00:54:16.017 [INFO][3913] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504" Namespace="kube-system" Pod="coredns-6f6b679f8f-m8b6z" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:16.031000 audit[4039]: NETFILTER_CFG table=filter:101 family=2 entries=44 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:16.031000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=22260 a0=3 a1=7ffce2aa9a80 a2=0 a3=7ffce2aa9a6c items=0 ppid=3656 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.031000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:16.040937 env[1234]: time="2025-05-08T00:54:16.040031498Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:16.040937 env[1234]: time="2025-05-08T00:54:16.040908872Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:16.041109 env[1234]: time="2025-05-08T00:54:16.040921076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:16.041109 env[1234]: time="2025-05-08T00:54:16.041039984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504 pid=4047 runtime=io.containerd.runc.v2 May 8 00:54:16.052167 systemd[1]: Started cri-containerd-fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504.scope. May 8 00:54:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.063000 audit: BPF prog-id=174 op=LOAD May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4047 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662643939326662356135336362663562363231653135393632383465 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4047 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662643939326662356135336362663562363231653135393632383465 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit: BPF prog-id=175 op=LOAD May 8 00:54:16.064000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021d3c0 items=0 ppid=4047 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662643939326662356135336362663562363231653135393632383465 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.064000 audit: BPF prog-id=176 op=LOAD May 8 00:54:16.064000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021d408 items=0 ppid=4047 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662643939326662356135336362663562363231653135393632383465 May 8 00:54:16.064000 audit: BPF prog-id=176 op=UNLOAD May 8 00:54:16.064000 audit: BPF prog-id=175 op=UNLOAD May 8 00:54:16.065000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.065000 audit: BPF prog-id=177 op=LOAD May 8 00:54:16.065000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021d818 items=0 ppid=4047 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662643939326662356135336362663562363231653135393632383465 May 8 00:54:16.067159 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:16.092804 env[1234]: time="2025-05-08T00:54:16.092744687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-m8b6z,Uid:f711de22-a49e-4bb2-afd9-4f662b0e29ae,Namespace:kube-system,Attempt:1,} returns sandbox id \"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504\"" May 8 00:54:16.094136 kubelet[2015]: E0508 00:54:16.093973 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:16.096764 env[1234]: time="2025-05-08T00:54:16.096717263Z" level=info msg="CreateContainer within sandbox \"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:54:16.106247 systemd-networkd[1043]: calid5435118ed2: Gained IPv6LL May 8 00:54:16.117146 systemd-networkd[1043]: cali93089a36549: Link UP May 8 00:54:16.119460 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali93089a36549: link becomes ready May 8 00:54:16.119240 systemd-networkd[1043]: cali93089a36549: Gained carrier May 8 00:54:16.121048 env[1234]: time="2025-05-08T00:54:16.120998794Z" level=info msg="CreateContainer within sandbox \"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"35b9058539d284eb640e9054426b78666cc15fe7abf609e2d03574c52bf7e9a0\"" May 8 00:54:16.125296 env[1234]: time="2025-05-08T00:54:16.125257499Z" level=info msg="StartContainer for \"35b9058539d284eb640e9054426b78666cc15fe7abf609e2d03574c52bf7e9a0\"" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:15.943 [INFO][3970] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0 calico-apiserver-5fd85c86c- calico-apiserver 48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d 946 0 2025-05-08 00:53:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fd85c86c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5fd85c86c-7n8xg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali93089a36549 [] []}} ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:15.943 [INFO][3970] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:15.979 [INFO][3998] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" HandleID="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:15.986 [INFO][3998] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" HandleID="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00055ce10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5fd85c86c-7n8xg", "timestamp":"2025-05-08 00:54:15.979280854 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:15.987 [INFO][3998] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.002 [INFO][3998] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.002 [INFO][3998] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.081 [INFO][3998] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.086 [INFO][3998] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.092 [INFO][3998] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.095 [INFO][3998] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.098 [INFO][3998] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.098 [INFO][3998] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.100 [INFO][3998] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47 May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.107 [INFO][3998] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.111 [INFO][3998] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.111 [INFO][3998] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" host="localhost" May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.111 [INFO][3998] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:16.131126 env[1234]: 2025-05-08 00:54:16.111 [INFO][3998] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" HandleID="k8s-pod-network.ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.114 [INFO][3970] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5fd85c86c-7n8xg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93089a36549", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.115 [INFO][3970] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.115 [INFO][3970] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali93089a36549 ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.120 [INFO][3970] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.120 [INFO][3970] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47", Pod:"calico-apiserver-5fd85c86c-7n8xg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93089a36549", MAC:"5e:3e:a0:40:d7:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.131854 env[1234]: 2025-05-08 00:54:16.127 [INFO][3970] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47" Namespace="calico-apiserver" Pod="calico-apiserver-5fd85c86c-7n8xg" WorkloadEndpoint="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:16.138000 audit[4114]: NETFILTER_CFG table=filter:102 family=2 entries=48 op=nft_register_chain pid=4114 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:16.138000 audit[4114]: SYSCALL arch=c000003e syscall=46 success=yes exit=25540 a0=3 a1=7ffd9d0e4030 a2=0 a3=7ffd9d0e401c items=0 ppid=3656 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:16.141130 systemd[1]: Started cri-containerd-35b9058539d284eb640e9054426b78666cc15fe7abf609e2d03574c52bf7e9a0.scope. May 8 00:54:16.153423 env[1234]: time="2025-05-08T00:54:16.153236298Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:16.153423 env[1234]: time="2025-05-08T00:54:16.153275353Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:16.153423 env[1234]: time="2025-05-08T00:54:16.153284831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:16.153931 env[1234]: time="2025-05-08T00:54:16.153836530Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47 pid=4136 runtime=io.containerd.runc.v2 May 8 00:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.153000 audit: BPF prog-id=178 op=LOAD May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4047 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623930353835333964323834656236343065393035343432366237 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4047 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623930353835333964323834656236343065393035343432366237 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit: BPF prog-id=179 op=LOAD May 8 00:54:16.154000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030e470 items=0 ppid=4047 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623930353835333964323834656236343065393035343432366237 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit: BPF prog-id=180 op=LOAD May 8 00:54:16.154000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030e4b8 items=0 ppid=4047 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623930353835333964323834656236343065393035343432366237 May 8 00:54:16.154000 audit: BPF prog-id=180 op=UNLOAD May 8 00:54:16.154000 audit: BPF prog-id=179 op=UNLOAD May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.154000 audit: BPF prog-id=181 op=LOAD May 8 00:54:16.154000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030e8c8 items=0 ppid=4047 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623930353835333964323834656236343065393035343432366237 May 8 00:54:16.167687 systemd[1]: Started cri-containerd-ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47.scope. May 8 00:54:16.180043 env[1234]: time="2025-05-08T00:54:16.179992790Z" level=info msg="StartContainer for \"35b9058539d284eb640e9054426b78666cc15fe7abf609e2d03574c52bf7e9a0\" returns successfully" May 8 00:54:16.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.179000 audit: BPF prog-id=182 op=LOAD May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4136 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564326532313237663136613666623531613463373739326566323563 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4136 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564326532313237663136613666623531613463373739326566323563 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit: BPF prog-id=183 op=LOAD May 8 00:54:16.180000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc230 items=0 ppid=4136 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564326532313237663136613666623531613463373739326566323563 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit: BPF prog-id=184 op=LOAD May 8 00:54:16.180000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bc278 items=0 ppid=4136 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564326532313237663136613666623531613463373739326566323563 May 8 00:54:16.180000 audit: BPF prog-id=184 op=UNLOAD May 8 00:54:16.180000 audit: BPF prog-id=183 op=UNLOAD May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.180000 audit: BPF prog-id=185 op=LOAD May 8 00:54:16.180000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bc688 items=0 ppid=4136 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564326532313237663136613666623531613463373739326566323563 May 8 00:54:16.182921 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:16.211940 env[1234]: time="2025-05-08T00:54:16.211898487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fd85c86c-7n8xg,Uid:48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47\"" May 8 00:54:16.223844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali408207990ba: link becomes ready May 8 00:54:16.223677 systemd-networkd[1043]: cali408207990ba: Link UP May 8 00:54:16.223808 systemd-networkd[1043]: cali408207990ba: Gained carrier May 8 00:54:16.231754 kubelet[2015]: E0508 00:54:16.231712 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:16.234714 kubelet[2015]: E0508 00:54:16.234641 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:16.244041 kubelet[2015]: I0508 00:54:16.243979 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-k7bm9" podStartSLOduration=41.24396375 podStartE2EDuration="41.24396375s" podCreationTimestamp="2025-05-08 00:53:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:54:16.242928763 +0000 UTC m=+47.461277965" watchObservedRunningTime="2025-05-08 00:54:16.24396375 +0000 UTC m=+47.462312962" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.037 [INFO][4008] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0 calico-kube-controllers-7845dcc4b7- calico-system c4f6f1e7-458d-46ec-85c4-573c69c50507 958 0 2025-05-08 00:53:41 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7845dcc4b7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7845dcc4b7-6v7qf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali408207990ba [] []}} ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.037 [INFO][4008] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.077 [INFO][4063] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" HandleID="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.087 [INFO][4063] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" HandleID="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dc5d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7845dcc4b7-6v7qf", "timestamp":"2025-05-08 00:54:16.077356397 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.087 [INFO][4063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.111 [INFO][4063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.111 [INFO][4063] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.182 [INFO][4063] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.190 [INFO][4063] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.194 [INFO][4063] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.195 [INFO][4063] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.197 [INFO][4063] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.197 [INFO][4063] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.199 [INFO][4063] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42 May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.205 [INFO][4063] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.213 [INFO][4063] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.213 [INFO][4063] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" host="localhost" May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.213 [INFO][4063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:16.248043 env[1234]: 2025-05-08 00:54:16.213 [INFO][4063] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" HandleID="k8s-pod-network.9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.219 [INFO][4008] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0", GenerateName:"calico-kube-controllers-7845dcc4b7-", Namespace:"calico-system", SelfLink:"", UID:"c4f6f1e7-458d-46ec-85c4-573c69c50507", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7845dcc4b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7845dcc4b7-6v7qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali408207990ba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.219 [INFO][4008] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.219 [INFO][4008] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali408207990ba ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.226 [INFO][4008] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.229 [INFO][4008] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0", GenerateName:"calico-kube-controllers-7845dcc4b7-", Namespace:"calico-system", SelfLink:"", UID:"c4f6f1e7-458d-46ec-85c4-573c69c50507", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7845dcc4b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42", Pod:"calico-kube-controllers-7845dcc4b7-6v7qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali408207990ba", MAC:"9e:d7:1e:a7:86:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:16.248827 env[1234]: 2025-05-08 00:54:16.241 [INFO][4008] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42" Namespace="calico-system" Pod="calico-kube-controllers-7845dcc4b7-6v7qf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:16.268041 kubelet[2015]: I0508 00:54:16.267762 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-m8b6z" podStartSLOduration=41.267741253 podStartE2EDuration="41.267741253s" podCreationTimestamp="2025-05-08 00:53:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:54:16.262357679 +0000 UTC m=+47.480706891" watchObservedRunningTime="2025-05-08 00:54:16.267741253 +0000 UTC m=+47.486090465" May 8 00:54:16.268113 systemd[1]: run-netns-cni\x2d48b51ab8\x2d5f45\x2dde63\x2d9539\x2da7efc3751bc8.mount: Deactivated successfully. May 8 00:54:16.274397 env[1234]: time="2025-05-08T00:54:16.274317918Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:54:16.274581 env[1234]: time="2025-05-08T00:54:16.274555865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:54:16.275003 env[1234]: time="2025-05-08T00:54:16.274932608Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:54:16.275177 env[1234]: time="2025-05-08T00:54:16.275126320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42 pid=4206 runtime=io.containerd.runc.v2 May 8 00:54:16.274000 audit[4202]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:16.274000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcc57c15e0 a2=0 a3=7ffcc57c15cc items=0 ppid=2160 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:16.279000 audit[4202]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:16.279000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcc57c15e0 a2=0 a3=0 items=0 ppid=2160 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:16.293541 systemd[1]: run-containerd-runc-k8s.io-9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42-runc.Ziwxjx.mount: Deactivated successfully. May 8 00:54:16.294000 audit[4226]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:16.294000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbbc17230 a2=0 a3=7fffbbc1721c items=0 ppid=2160 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:16.298124 systemd[1]: Started cri-containerd-9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42.scope. May 8 00:54:16.304000 audit[4226]: NETFILTER_CFG table=nat:106 family=2 entries=47 op=nft_register_chain pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:16.304000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffbbc17230 a2=0 a3=7fffbbc1721c items=0 ppid=2160 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:16.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit: BPF prog-id=186 op=LOAD May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4206 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373563653135623930373233346265323166643566363966306635 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4206 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373563653135623930373233346265323166643566363966306635 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.310000 audit: BPF prog-id=187 op=LOAD May 8 00:54:16.310000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039fa60 items=0 ppid=4206 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373563653135623930373233346265323166643566363966306635 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit: BPF prog-id=188 op=LOAD May 8 00:54:16.311000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039faa8 items=0 ppid=4206 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373563653135623930373233346265323166643566363966306635 May 8 00:54:16.311000 audit: BPF prog-id=188 op=UNLOAD May 8 00:54:16.311000 audit: BPF prog-id=187 op=UNLOAD May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:16.311000 audit: BPF prog-id=189 op=LOAD May 8 00:54:16.311000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039feb8 items=0 ppid=4206 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373563653135623930373233346265323166643566363966306635 May 8 00:54:16.313445 systemd-resolved[1171]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:54:16.323000 audit[4239]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:54:16.323000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=20984 a0=3 a1=7ffedbfc4000 a2=0 a3=7ffedbfc3fec items=0 ppid=3656 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.323000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:54:16.339395 env[1234]: time="2025-05-08T00:54:16.339324816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7845dcc4b7-6v7qf,Uid:c4f6f1e7-458d-46ec-85c4-573c69c50507,Namespace:calico-system,Attempt:1,} returns sandbox id \"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42\"" May 8 00:54:16.808518 systemd-networkd[1043]: cali9a70e0fdf3d: Gained IPv6LL May 8 00:54:17.000999 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL May 8 00:54:17.238956 kubelet[2015]: E0508 00:54:17.238510 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:17.238956 kubelet[2015]: E0508 00:54:17.238724 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:17.386935 systemd-networkd[1043]: cali93089a36549: Gained IPv6LL May 8 00:54:17.448631 systemd-networkd[1043]: cali408207990ba: Gained IPv6LL May 8 00:54:17.449014 systemd-networkd[1043]: calib2c90e9dbc3: Gained IPv6LL May 8 00:54:18.240610 kubelet[2015]: E0508 00:54:18.240577 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:18.241268 kubelet[2015]: E0508 00:54:18.240621 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:18.527761 env[1234]: time="2025-05-08T00:54:18.527625683Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:18.529603 env[1234]: time="2025-05-08T00:54:18.529568389Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:18.531314 env[1234]: time="2025-05-08T00:54:18.531271654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:18.532662 env[1234]: time="2025-05-08T00:54:18.532623266Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:18.533093 env[1234]: time="2025-05-08T00:54:18.533057609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:54:18.534262 env[1234]: time="2025-05-08T00:54:18.534233283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:54:18.535439 env[1234]: time="2025-05-08T00:54:18.535353651Z" level=info msg="CreateContainer within sandbox \"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:54:18.548020 env[1234]: time="2025-05-08T00:54:18.547965152Z" level=info msg="CreateContainer within sandbox \"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1aa399d938fe7e4061d294735df80f8bff8294b61aaea2b666fe848fb7440dc3\"" May 8 00:54:18.548489 env[1234]: time="2025-05-08T00:54:18.548462615Z" level=info msg="StartContainer for \"1aa399d938fe7e4061d294735df80f8bff8294b61aaea2b666fe848fb7440dc3\"" May 8 00:54:18.566554 systemd[1]: Started cri-containerd-1aa399d938fe7e4061d294735df80f8bff8294b61aaea2b666fe848fb7440dc3.scope. May 8 00:54:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.579658 kernel: kauditd_printk_skb: 1015 callbacks suppressed May 8 00:54:18.579729 kernel: audit: type=1400 audit(1746665658.577:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.585700 kernel: audit: type=1400 audit(1746665658.577:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.585767 kernel: audit: type=1400 audit(1746665658.577:1318): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.595367 kernel: audit: type=1400 audit(1746665658.577:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.595440 kernel: audit: type=1400 audit(1746665658.577:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.595469 kernel: audit: type=1400 audit(1746665658.577:1321): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.601094 kernel: audit: type=1400 audit(1746665658.577:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.601141 kernel: audit: type=1400 audit(1746665658.577:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.607345 kernel: audit: type=1400 audit(1746665658.577:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.607402 kernel: audit: type=1400 audit(1746665658.581:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit: BPF prog-id=190 op=LOAD May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3450 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161613339396439333866653765343036316432393437333564663830 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3450 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161613339396439333866653765343036316432393437333564663830 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.581000 audit: BPF prog-id=191 op=LOAD May 8 00:54:18.581000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030ec00 items=0 ppid=3450 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161613339396439333866653765343036316432393437333564663830 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.584000 audit: BPF prog-id=192 op=LOAD May 8 00:54:18.584000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030ec48 items=0 ppid=3450 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161613339396439333866653765343036316432393437333564663830 May 8 00:54:18.590000 audit: BPF prog-id=192 op=UNLOAD May 8 00:54:18.590000 audit: BPF prog-id=191 op=UNLOAD May 8 00:54:18.590000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:18.590000 audit: BPF prog-id=193 op=LOAD May 8 00:54:18.590000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030f058 items=0 ppid=3450 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161613339396439333866653765343036316432393437333564663830 May 8 00:54:18.663144 env[1234]: time="2025-05-08T00:54:18.663058845Z" level=info msg="StartContainer for \"1aa399d938fe7e4061d294735df80f8bff8294b61aaea2b666fe848fb7440dc3\" returns successfully" May 8 00:54:19.383746 kubelet[2015]: I0508 00:54:19.383671 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fd85c86c-zhsrj" podStartSLOduration=34.389240843 podStartE2EDuration="38.383648078s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:54:14.539606196 +0000 UTC m=+45.757955408" lastFinishedPulling="2025-05-08 00:54:18.534013431 +0000 UTC m=+49.752362643" observedRunningTime="2025-05-08 00:54:19.383116089 +0000 UTC m=+50.601465331" watchObservedRunningTime="2025-05-08 00:54:19.383648078 +0000 UTC m=+50.601997290" May 8 00:54:19.567000 audit[4289]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:19.567000 audit[4289]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffca68f3d50 a2=0 a3=7ffca68f3d3c items=0 ppid=2160 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:19.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:19.572000 audit[4289]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:19.572000 audit[4289]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca68f3d50 a2=0 a3=7ffca68f3d3c items=0 ppid=2160 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:19.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:19.747986 systemd[1]: Started sshd@13-10.0.0.137:22-10.0.0.1:50438.service. May 8 00:54:19.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.137:22-10.0.0.1:50438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:19.827000 audit[4291]: USER_ACCT pid=4291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:19.828832 sshd[4291]: Accepted publickey for core from 10.0.0.1 port 50438 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:19.830000 audit[4291]: CRED_ACQ pid=4291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:19.830000 audit[4291]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff22ba0e0 a2=3 a3=0 items=0 ppid=1 pid=4291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:19.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:19.848500 sshd[4291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:19.928202 systemd-logind[1220]: New session 14 of user core. May 8 00:54:19.929437 systemd[1]: Started session-14.scope. May 8 00:54:19.934000 audit[4291]: USER_START pid=4291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:19.936000 audit[4293]: CRED_ACQ pid=4293 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:20.148401 sshd[4291]: pam_unix(sshd:session): session closed for user core May 8 00:54:20.147000 audit[4291]: USER_END pid=4291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:20.148000 audit[4291]: CRED_DISP pid=4291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:20.150660 systemd[1]: sshd@13-10.0.0.137:22-10.0.0.1:50438.service: Deactivated successfully. May 8 00:54:20.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.137:22-10.0.0.1:50438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:20.151429 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:54:20.151871 systemd-logind[1220]: Session 14 logged out. Waiting for processes to exit. May 8 00:54:20.152705 systemd-logind[1220]: Removed session 14. May 8 00:54:20.625000 audit[4268]: AVC avc: denied { watch } for pid=4268 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_54_00.2382392815/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c613,c1002 tclass=file permissive=0 May 8 00:54:20.625000 audit[4268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d237c0 a2=fc6 a3=0 items=0 ppid=3450 pid=4268 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c1002 key=(null) May 8 00:54:20.625000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:54:20.757000 audit[4305]: NETFILTER_CFG table=filter:110 family=2 entries=9 op=nft_register_rule pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:20.757000 audit[4305]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdf4df37b0 a2=0 a3=7ffdf4df379c items=0 ppid=2160 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:20.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:20.765000 audit[4305]: NETFILTER_CFG table=nat:111 family=2 entries=27 op=nft_register_chain pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:20.765000 audit[4305]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdf4df37b0 a2=0 a3=7ffdf4df379c items=0 ppid=2160 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:20.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:21.219847 env[1234]: time="2025-05-08T00:54:21.219781562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.266161 env[1234]: time="2025-05-08T00:54:21.266077140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.267700 env[1234]: time="2025-05-08T00:54:21.267669357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.269627 env[1234]: time="2025-05-08T00:54:21.269588120Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.270017 env[1234]: time="2025-05-08T00:54:21.269968028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 8 00:54:21.271043 env[1234]: time="2025-05-08T00:54:21.270983802Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:54:21.272172 env[1234]: time="2025-05-08T00:54:21.272126259Z" level=info msg="CreateContainer within sandbox \"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:54:21.287509 env[1234]: time="2025-05-08T00:54:21.287459379Z" level=info msg="CreateContainer within sandbox \"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5e0f62e1da6bf818dcd524c4b17f9a45500e941c0891390cb9f4e021831f3e48\"" May 8 00:54:21.287985 env[1234]: time="2025-05-08T00:54:21.287953195Z" level=info msg="StartContainer for \"5e0f62e1da6bf818dcd524c4b17f9a45500e941c0891390cb9f4e021831f3e48\"" May 8 00:54:21.312097 systemd[1]: Started cri-containerd-5e0f62e1da6bf818dcd524c4b17f9a45500e941c0891390cb9f4e021831f3e48.scope. May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f84a43aa738 items=0 ppid=3613 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306636326531646136626638313864636435323463346231376639 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.322000 audit: BPF prog-id=194 op=LOAD May 8 00:54:21.322000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e408 items=0 ppid=3613 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306636326531646136626638313864636435323463346231376639 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit: BPF prog-id=195 op=LOAD May 8 00:54:21.323000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e458 items=0 ppid=3613 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306636326531646136626638313864636435323463346231376639 May 8 00:54:21.323000 audit: BPF prog-id=195 op=UNLOAD May 8 00:54:21.323000 audit: BPF prog-id=194 op=UNLOAD May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.323000 audit: BPF prog-id=196 op=LOAD May 8 00:54:21.323000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e4e8 items=0 ppid=3613 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306636326531646136626638313864636435323463346231376639 May 8 00:54:21.337230 env[1234]: time="2025-05-08T00:54:21.337181826Z" level=info msg="StartContainer for \"5e0f62e1da6bf818dcd524c4b17f9a45500e941c0891390cb9f4e021831f3e48\" returns successfully" May 8 00:54:21.654476 env[1234]: time="2025-05-08T00:54:21.654415516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.656494 env[1234]: time="2025-05-08T00:54:21.656451923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.658269 env[1234]: time="2025-05-08T00:54:21.658241439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.659988 env[1234]: time="2025-05-08T00:54:21.659952684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:21.660439 env[1234]: time="2025-05-08T00:54:21.660407576Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:54:21.661540 env[1234]: time="2025-05-08T00:54:21.661505146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:54:21.662662 env[1234]: time="2025-05-08T00:54:21.662634508Z" level=info msg="CreateContainer within sandbox \"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:54:21.674969 env[1234]: time="2025-05-08T00:54:21.674920796Z" level=info msg="CreateContainer within sandbox \"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5068988369bc0717ca50a2d02820f24182aa36e43543623a137161edc63e169c\"" May 8 00:54:21.675581 env[1234]: time="2025-05-08T00:54:21.675526135Z" level=info msg="StartContainer for \"5068988369bc0717ca50a2d02820f24182aa36e43543623a137161edc63e169c\"" May 8 00:54:21.691896 systemd[1]: Started cri-containerd-5068988369bc0717ca50a2d02820f24182aa36e43543623a137161edc63e169c.scope. May 8 00:54:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit: BPF prog-id=197 op=LOAD May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4136 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363839383833363962633037313763613530613264303238323066 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4136 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363839383833363962633037313763613530613264303238323066 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit: BPF prog-id=198 op=LOAD May 8 00:54:21.705000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00036c7c0 items=0 ppid=4136 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363839383833363962633037313763613530613264303238323066 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit: BPF prog-id=199 op=LOAD May 8 00:54:21.705000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00036c808 items=0 ppid=4136 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363839383833363962633037313763613530613264303238323066 May 8 00:54:21.705000 audit: BPF prog-id=199 op=UNLOAD May 8 00:54:21.705000 audit: BPF prog-id=198 op=UNLOAD May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:21.705000 audit: BPF prog-id=200 op=LOAD May 8 00:54:21.705000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00036cc18 items=0 ppid=4136 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:21.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363839383833363962633037313763613530613264303238323066 May 8 00:54:21.733028 env[1234]: time="2025-05-08T00:54:21.732961506Z" level=info msg="StartContainer for \"5068988369bc0717ca50a2d02820f24182aa36e43543623a137161edc63e169c\" returns successfully" May 8 00:54:22.274000 audit[4392]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.274000 audit[4392]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdf8e3fb00 a2=0 a3=7ffdf8e3faec items=0 ppid=2160 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:22.286000 audit[4392]: NETFILTER_CFG table=nat:113 family=2 entries=30 op=nft_register_rule pid=4392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.286000 audit[4392]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdf8e3fb00 a2=0 a3=7ffdf8e3faec items=0 ppid=2160 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:22.729000 audit[4371]: AVC avc: denied { watch } for pid=4371 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_54_00.556561056/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c999 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c520,c999 tclass=file permissive=0 May 8 00:54:22.729000 audit[4371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00139c320 a2=fc6 a3=0 items=0 ppid=4136 pid=4371 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c999 key=(null) May 8 00:54:22.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:54:23.259253 kubelet[2015]: I0508 00:54:23.259205 2015 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:24.428431 env[1234]: time="2025-05-08T00:54:24.428351752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:24.430342 env[1234]: time="2025-05-08T00:54:24.430291119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:24.431855 env[1234]: time="2025-05-08T00:54:24.431803510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:24.433398 env[1234]: time="2025-05-08T00:54:24.433336761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:24.433771 env[1234]: time="2025-05-08T00:54:24.433731936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 8 00:54:24.435276 env[1234]: time="2025-05-08T00:54:24.434793715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:54:24.445250 env[1234]: time="2025-05-08T00:54:24.445198561Z" level=info msg="CreateContainer within sandbox \"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:54:24.458610 env[1234]: time="2025-05-08T00:54:24.458549308Z" level=info msg="CreateContainer within sandbox \"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a827f1f71a61427b510a6d85faf7c38ab6f2c5439bec3abec2eaafc647f87ec1\"" May 8 00:54:24.459210 env[1234]: time="2025-05-08T00:54:24.459070285Z" level=info msg="StartContainer for \"a827f1f71a61427b510a6d85faf7c38ab6f2c5439bec3abec2eaafc647f87ec1\"" May 8 00:54:24.473736 systemd[1]: Started cri-containerd-a827f1f71a61427b510a6d85faf7c38ab6f2c5439bec3abec2eaafc647f87ec1.scope. May 8 00:54:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.492426 kernel: kauditd_printk_skb: 182 callbacks suppressed May 8 00:54:24.492489 kernel: audit: type=1400 audit(1746665664.487:1375): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.492514 kernel: audit: type=1400 audit(1746665664.487:1376): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.495414 kernel: audit: type=1400 audit(1746665664.487:1377): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.501424 kernel: audit: type=1400 audit(1746665664.487:1378): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.501471 kernel: audit: type=1400 audit(1746665664.487:1379): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.507591 kernel: audit: type=1400 audit(1746665664.487:1380): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.507690 kernel: audit: type=1400 audit(1746665664.487:1381): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.513607 kernel: audit: type=1400 audit(1746665664.487:1382): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.513651 kernel: audit: type=1400 audit(1746665664.487:1383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.519393 kernel: audit: type=1400 audit(1746665664.491:1384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit: BPF prog-id=201 op=LOAD May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4206 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323766316637316136313432376235313061366438356661663763 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4206 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323766316637316136313432376235313061366438356661663763 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.491000 audit: BPF prog-id=202 op=LOAD May 8 00:54:24.491000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=4206 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323766316637316136313432376235313061366438356661663763 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.494000 audit: BPF prog-id=203 op=LOAD May 8 00:54:24.494000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=4206 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:24.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323766316637316136313432376235313061366438356661663763 May 8 00:54:24.497000 audit: BPF prog-id=203 op=UNLOAD May 8 00:54:24.497000 audit: BPF prog-id=202 op=UNLOAD May 8 00:54:24.497000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:24.497000 audit: BPF prog-id=204 op=LOAD May 8 00:54:24.497000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8168 items=0 ppid=4206 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:24.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323766316637316136313432376235313061366438356661663763 May 8 00:54:24.536348 env[1234]: time="2025-05-08T00:54:24.536294493Z" level=info msg="StartContainer for \"a827f1f71a61427b510a6d85faf7c38ab6f2c5439bec3abec2eaafc647f87ec1\" returns successfully" May 8 00:54:25.025000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.025000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.025000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ef38c0 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:25.025000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3c580 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:25.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:25.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:25.154835 systemd[1]: Started sshd@14-10.0.0.137:22-10.0.0.1:40464.service. May 8 00:54:25.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.137:22-10.0.0.1:40464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:25.194000 audit[4435]: USER_ACCT pid=4435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.196142 sshd[4435]: Accepted publickey for core from 10.0.0.1 port 40464 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:25.195000 audit[4435]: CRED_ACQ pid=4435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.195000 audit[4435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfd38c960 a2=3 a3=0 items=0 ppid=1 pid=4435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:25.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:25.197442 sshd[4435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:25.201681 systemd-logind[1220]: New session 15 of user core. May 8 00:54:25.202731 systemd[1]: Started session-15.scope. May 8 00:54:25.206000 audit[4435]: USER_START pid=4435 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.208000 audit[4437]: CRED_ACQ pid=4437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.306921 kubelet[2015]: I0508 00:54:25.306479 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fd85c86c-7n8xg" podStartSLOduration=38.85852579 podStartE2EDuration="44.306452696s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:54:16.21332242 +0000 UTC m=+47.431671622" lastFinishedPulling="2025-05-08 00:54:21.661249316 +0000 UTC m=+52.879598528" observedRunningTime="2025-05-08 00:54:22.264851633 +0000 UTC m=+53.483200845" watchObservedRunningTime="2025-05-08 00:54:25.306452696 +0000 UTC m=+56.524801908" May 8 00:54:25.306921 kubelet[2015]: I0508 00:54:25.306576 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7845dcc4b7-6v7qf" podStartSLOduration=36.213383091 podStartE2EDuration="44.306571012s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:54:16.341448423 +0000 UTC m=+47.559797635" lastFinishedPulling="2025-05-08 00:54:24.434636324 +0000 UTC m=+55.652985556" observedRunningTime="2025-05-08 00:54:25.306152603 +0000 UTC m=+56.524501815" watchObservedRunningTime="2025-05-08 00:54:25.306571012 +0000 UTC m=+56.524920214" May 8 00:54:25.360884 sshd[4435]: pam_unix(sshd:session): session closed for user core May 8 00:54:25.362000 audit[4435]: USER_END pid=4435 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.362000 audit[4435]: CRED_DISP pid=4435 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:25.366272 systemd[1]: sshd@14-10.0.0.137:22-10.0.0.1:40464.service: Deactivated successfully. May 8 00:54:25.367251 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:54:25.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.137:22-10.0.0.1:40464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:25.368321 systemd-logind[1220]: Session 15 logged out. Waiting for processes to exit. May 8 00:54:25.369290 systemd-logind[1220]: Removed session 15. May 8 00:54:25.539000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.539000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.539000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.539000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0081fc0c0 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.539000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0074eac60 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:25.539000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00970f920 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:25.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:25.546000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.546000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0074ead50 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:25.546000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.546000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c007411200 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:25.546000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:25.546000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c006afd020 a2=fc6 a3=0 items=0 ppid=1744 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c644,c863 key=(null) May 8 00:54:25.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:26.300665 env[1234]: time="2025-05-08T00:54:26.300587883Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:26.302576 env[1234]: time="2025-05-08T00:54:26.302544079Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:26.304331 env[1234]: time="2025-05-08T00:54:26.304292447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:26.305545 env[1234]: time="2025-05-08T00:54:26.305519961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:54:26.306063 env[1234]: time="2025-05-08T00:54:26.306017721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 8 00:54:26.308394 env[1234]: time="2025-05-08T00:54:26.308331149Z" level=info msg="CreateContainer within sandbox \"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:54:26.323338 env[1234]: time="2025-05-08T00:54:26.323288580Z" level=info msg="CreateContainer within sandbox \"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4136c02f87395d742ea9f8e4056e305d83b953a31549e5b97da6e17daab4153c\"" May 8 00:54:26.325085 env[1234]: time="2025-05-08T00:54:26.324018174Z" level=info msg="StartContainer for \"4136c02f87395d742ea9f8e4056e305d83b953a31549e5b97da6e17daab4153c\"" May 8 00:54:26.352989 systemd[1]: Started cri-containerd-4136c02f87395d742ea9f8e4056e305d83b953a31549e5b97da6e17daab4153c.scope. May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f672f9037c8 items=0 ppid=3613 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:26.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431333663303266383733393564373432656139663865343035366533 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit: BPF prog-id=205 op=LOAD May 8 00:54:26.368000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000337da8 items=0 ppid=3613 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:26.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431333663303266383733393564373432656139663865343035366533 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit: BPF prog-id=206 op=LOAD May 8 00:54:26.368000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000337df8 items=0 ppid=3613 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:26.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431333663303266383733393564373432656139663865343035366533 May 8 00:54:26.368000 audit: BPF prog-id=206 op=UNLOAD May 8 00:54:26.368000 audit: BPF prog-id=205 op=UNLOAD May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:54:26.368000 audit: BPF prog-id=207 op=LOAD May 8 00:54:26.368000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000337e88 items=0 ppid=3613 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:26.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431333663303266383733393564373432656139663865343035366533 May 8 00:54:26.440223 systemd[1]: run-containerd-runc-k8s.io-4136c02f87395d742ea9f8e4056e305d83b953a31549e5b97da6e17daab4153c-runc.bmRpjX.mount: Deactivated successfully. May 8 00:54:26.530139 env[1234]: time="2025-05-08T00:54:26.530050187Z" level=info msg="StartContainer for \"4136c02f87395d742ea9f8e4056e305d83b953a31549e5b97da6e17daab4153c\" returns successfully" May 8 00:54:26.929851 kubelet[2015]: I0508 00:54:26.929802 2015 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:54:26.929851 kubelet[2015]: I0508 00:54:26.929844 2015 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:54:27.285525 kubelet[2015]: I0508 00:54:27.285472 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-j4dtk" podStartSLOduration=35.067230249 podStartE2EDuration="46.285444098s" podCreationTimestamp="2025-05-08 00:53:41 +0000 UTC" firstStartedPulling="2025-05-08 00:54:15.088650429 +0000 UTC m=+46.306999641" lastFinishedPulling="2025-05-08 00:54:26.306864278 +0000 UTC m=+57.525213490" observedRunningTime="2025-05-08 00:54:27.285427526 +0000 UTC m=+58.503776758" watchObservedRunningTime="2025-05-08 00:54:27.285444098 +0000 UTC m=+58.503793311" May 8 00:54:28.856674 env[1234]: time="2025-05-08T00:54:28.856585930Z" level=info msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.892 [WARNING][4529] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"878f6d96-6e02-4a11-9fcf-a72dfc3b7541", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a", Pod:"coredns-6f6b679f8f-k7bm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba535ba2089", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.892 [INFO][4529] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.892 [INFO][4529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" iface="eth0" netns="" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.892 [INFO][4529] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.892 [INFO][4529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.913 [INFO][4539] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.913 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.914 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.920 [WARNING][4539] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.920 [INFO][4539] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.921 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:28.925001 env[1234]: 2025-05-08 00:54:28.923 [INFO][4529] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.925540 env[1234]: time="2025-05-08T00:54:28.925030763Z" level=info msg="TearDown network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" successfully" May 8 00:54:28.925540 env[1234]: time="2025-05-08T00:54:28.925059709Z" level=info msg="StopPodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" returns successfully" May 8 00:54:28.925869 env[1234]: time="2025-05-08T00:54:28.925834908Z" level=info msg="RemovePodSandbox for \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" May 8 00:54:28.925937 env[1234]: time="2025-05-08T00:54:28.925871738Z" level=info msg="Forcibly stopping sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\"" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.959 [WARNING][4561] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"878f6d96-6e02-4a11-9fcf-a72dfc3b7541", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b6ce22e874a4b4dae412164d1f094f1b81e12d73f5a8c230e09ee2a964b7a71a", Pod:"coredns-6f6b679f8f-k7bm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba535ba2089", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.959 [INFO][4561] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.959 [INFO][4561] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" iface="eth0" netns="" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.959 [INFO][4561] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.959 [INFO][4561] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.980 [INFO][4570] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.980 [INFO][4570] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.980 [INFO][4570] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.986 [WARNING][4570] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.986 [INFO][4570] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" HandleID="k8s-pod-network.75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" Workload="localhost-k8s-coredns--6f6b679f8f--k7bm9-eth0" May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.987 [INFO][4570] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:28.990328 env[1234]: 2025-05-08 00:54:28.988 [INFO][4561] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943" May 8 00:54:28.990938 env[1234]: time="2025-05-08T00:54:28.990350525Z" level=info msg="TearDown network for sandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" successfully" May 8 00:54:28.994019 env[1234]: time="2025-05-08T00:54:28.993985570Z" level=info msg="RemovePodSandbox \"75e21a01518688ccc0c9c54848dc5442f8ef570f6f4ae8a8c47cb77662437943\" returns successfully" May 8 00:54:28.994722 env[1234]: time="2025-05-08T00:54:28.994686517Z" level=info msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.028 [WARNING][4593] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0", GenerateName:"calico-kube-controllers-7845dcc4b7-", Namespace:"calico-system", SelfLink:"", UID:"c4f6f1e7-458d-46ec-85c4-573c69c50507", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7845dcc4b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42", Pod:"calico-kube-controllers-7845dcc4b7-6v7qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali408207990ba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.028 [INFO][4593] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.028 [INFO][4593] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" iface="eth0" netns="" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.028 [INFO][4593] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.028 [INFO][4593] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.049 [INFO][4602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.049 [INFO][4602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.049 [INFO][4602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.054 [WARNING][4602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.054 [INFO][4602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.056 [INFO][4602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.060530 env[1234]: 2025-05-08 00:54:29.058 [INFO][4593] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.061105 env[1234]: time="2025-05-08T00:54:29.060566840Z" level=info msg="TearDown network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" successfully" May 8 00:54:29.061105 env[1234]: time="2025-05-08T00:54:29.060601306Z" level=info msg="StopPodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" returns successfully" May 8 00:54:29.061286 env[1234]: time="2025-05-08T00:54:29.061238912Z" level=info msg="RemovePodSandbox for \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" May 8 00:54:29.061467 env[1234]: time="2025-05-08T00:54:29.061283817Z" level=info msg="Forcibly stopping sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\"" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.094 [WARNING][4624] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0", GenerateName:"calico-kube-controllers-7845dcc4b7-", Namespace:"calico-system", SelfLink:"", UID:"c4f6f1e7-458d-46ec-85c4-573c69c50507", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7845dcc4b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9675ce15b907234be21fd5f69f0f5194e5e9b97601236ed342ecc2e121d88b42", Pod:"calico-kube-controllers-7845dcc4b7-6v7qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali408207990ba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.095 [INFO][4624] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.095 [INFO][4624] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" iface="eth0" netns="" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.095 [INFO][4624] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.095 [INFO][4624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.115 [INFO][4632] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.115 [INFO][4632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.115 [INFO][4632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.121 [WARNING][4632] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.121 [INFO][4632] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" HandleID="k8s-pod-network.7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" Workload="localhost-k8s-calico--kube--controllers--7845dcc4b7--6v7qf-eth0" May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.123 [INFO][4632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.127166 env[1234]: 2025-05-08 00:54:29.125 [INFO][4624] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693" May 8 00:54:29.127166 env[1234]: time="2025-05-08T00:54:29.127115663Z" level=info msg="TearDown network for sandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" successfully" May 8 00:54:29.131169 env[1234]: time="2025-05-08T00:54:29.131116783Z" level=info msg="RemovePodSandbox \"7a3243b809007e88203f513aea65707f43b9fb866e00c70c2cb28808c7262693\" returns successfully" May 8 00:54:29.131985 env[1234]: time="2025-05-08T00:54:29.131931296Z" level=info msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" May 8 00:54:29.181000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:29.181000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001420bc0 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:29.181000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:29.183000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:29.183000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001420be0 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:29.183000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:29.184000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:29.184000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d3cfa0 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:29.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:29.184000 audit[1847]: AVC avc: denied { watch } for pid=1847 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:29.184000 audit[1847]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001420c00 a2=fc6 a3=0 items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c409 key=(null) May 8 00:54:29.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.166 [WARNING][4654] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"56531f88-a3b4-4d98-a0d7-ed634d8f4930", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441", Pod:"calico-apiserver-5fd85c86c-zhsrj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5435118ed2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.167 [INFO][4654] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.167 [INFO][4654] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" iface="eth0" netns="" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.167 [INFO][4654] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.167 [INFO][4654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.189 [INFO][4663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.189 [INFO][4663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.189 [INFO][4663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.195 [WARNING][4663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.195 [INFO][4663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.196 [INFO][4663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.200638 env[1234]: 2025-05-08 00:54:29.199 [INFO][4654] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.201214 env[1234]: time="2025-05-08T00:54:29.200665467Z" level=info msg="TearDown network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" successfully" May 8 00:54:29.201214 env[1234]: time="2025-05-08T00:54:29.200709221Z" level=info msg="StopPodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" returns successfully" May 8 00:54:29.201279 env[1234]: time="2025-05-08T00:54:29.201211238Z" level=info msg="RemovePodSandbox for \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" May 8 00:54:29.201308 env[1234]: time="2025-05-08T00:54:29.201253168Z" level=info msg="Forcibly stopping sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\"" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.234 [WARNING][4687] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"56531f88-a3b4-4d98-a0d7-ed634d8f4930", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"118905dc70e3be2548a18c85ca572f872306f313527d3f6bc6f7da14dd6b6441", Pod:"calico-apiserver-5fd85c86c-zhsrj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5435118ed2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.235 [INFO][4687] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.235 [INFO][4687] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" iface="eth0" netns="" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.235 [INFO][4687] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.235 [INFO][4687] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.257 [INFO][4697] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.258 [INFO][4697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.258 [INFO][4697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.263 [WARNING][4697] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.263 [INFO][4697] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" HandleID="k8s-pod-network.a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" Workload="localhost-k8s-calico--apiserver--5fd85c86c--zhsrj-eth0" May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.265 [INFO][4697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.268813 env[1234]: 2025-05-08 00:54:29.267 [INFO][4687] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97" May 8 00:54:29.269403 env[1234]: time="2025-05-08T00:54:29.268855249Z" level=info msg="TearDown network for sandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" successfully" May 8 00:54:29.272466 env[1234]: time="2025-05-08T00:54:29.272440086Z" level=info msg="RemovePodSandbox \"a3b845ad046ff665ae8cd03eb60706774f27e9345f9d3abb9d9632935089aa97\" returns successfully" May 8 00:54:29.272978 env[1234]: time="2025-05-08T00:54:29.272925211Z" level=info msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.310 [WARNING][4719] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f711de22-a49e-4bb2-afd9-4f662b0e29ae", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504", Pod:"coredns-6f6b679f8f-m8b6z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib2c90e9dbc3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.310 [INFO][4719] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.310 [INFO][4719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" iface="eth0" netns="" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.311 [INFO][4719] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.311 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.333 [INFO][4727] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.333 [INFO][4727] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.333 [INFO][4727] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.339 [WARNING][4727] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.339 [INFO][4727] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.341 [INFO][4727] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.345461 env[1234]: 2025-05-08 00:54:29.343 [INFO][4719] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.346064 env[1234]: time="2025-05-08T00:54:29.345488194Z" level=info msg="TearDown network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" successfully" May 8 00:54:29.346064 env[1234]: time="2025-05-08T00:54:29.345522930Z" level=info msg="StopPodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" returns successfully" May 8 00:54:29.346064 env[1234]: time="2025-05-08T00:54:29.346035167Z" level=info msg="RemovePodSandbox for \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" May 8 00:54:29.346160 env[1234]: time="2025-05-08T00:54:29.346081205Z" level=info msg="Forcibly stopping sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\"" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.383 [WARNING][4753] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f711de22-a49e-4bb2-afd9-4f662b0e29ae", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbd992fb5a53cbf5b621e1596284ea5e3e82ca6b3f6dfa9aa0a60ce44806e504", Pod:"coredns-6f6b679f8f-m8b6z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib2c90e9dbc3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.384 [INFO][4753] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.384 [INFO][4753] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" iface="eth0" netns="" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.384 [INFO][4753] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.384 [INFO][4753] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.404 [INFO][4761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.404 [INFO][4761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.404 [INFO][4761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.410 [WARNING][4761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.410 [INFO][4761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" HandleID="k8s-pod-network.7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" Workload="localhost-k8s-coredns--6f6b679f8f--m8b6z-eth0" May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.411 [INFO][4761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.415427 env[1234]: 2025-05-08 00:54:29.413 [INFO][4753] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc" May 8 00:54:29.415427 env[1234]: time="2025-05-08T00:54:29.415360595Z" level=info msg="TearDown network for sandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" successfully" May 8 00:54:29.419233 env[1234]: time="2025-05-08T00:54:29.419198224Z" level=info msg="RemovePodSandbox \"7ba6b80c4ffb88974935dbeb0327859741f5044d2805e5085537fc9bb40971bc\" returns successfully" May 8 00:54:29.419821 env[1234]: time="2025-05-08T00:54:29.419780474Z" level=info msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.454 [WARNING][4783] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47", Pod:"calico-apiserver-5fd85c86c-7n8xg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93089a36549", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.454 [INFO][4783] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.454 [INFO][4783] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" iface="eth0" netns="" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.454 [INFO][4783] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.454 [INFO][4783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.475 [INFO][4793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.475 [INFO][4793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.475 [INFO][4793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.481 [WARNING][4793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.481 [INFO][4793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.483 [INFO][4793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.486273 env[1234]: 2025-05-08 00:54:29.484 [INFO][4783] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.486869 env[1234]: time="2025-05-08T00:54:29.486272830Z" level=info msg="TearDown network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" successfully" May 8 00:54:29.486869 env[1234]: time="2025-05-08T00:54:29.486312906Z" level=info msg="StopPodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" returns successfully" May 8 00:54:29.486926 env[1234]: time="2025-05-08T00:54:29.486895817Z" level=info msg="RemovePodSandbox for \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" May 8 00:54:29.487006 env[1234]: time="2025-05-08T00:54:29.486940182Z" level=info msg="Forcibly stopping sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\"" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.520 [WARNING][4816] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0", GenerateName:"calico-apiserver-5fd85c86c-", Namespace:"calico-apiserver", SelfLink:"", UID:"48e02dfd-d244-4ad0-b0dc-cb8a4440aa3d", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fd85c86c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ed2e2127f16a6fb51a4c7792ef25c29b6616abfc612943f6a0e4887b166abb47", Pod:"calico-apiserver-5fd85c86c-7n8xg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93089a36549", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.520 [INFO][4816] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.520 [INFO][4816] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" iface="eth0" netns="" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.520 [INFO][4816] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.520 [INFO][4816] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.541 [INFO][4824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.541 [INFO][4824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.541 [INFO][4824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.546 [WARNING][4824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.546 [INFO][4824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" HandleID="k8s-pod-network.7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" Workload="localhost-k8s-calico--apiserver--5fd85c86c--7n8xg-eth0" May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.548 [INFO][4824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.551308 env[1234]: 2025-05-08 00:54:29.549 [INFO][4816] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4" May 8 00:54:29.551809 env[1234]: time="2025-05-08T00:54:29.551333996Z" level=info msg="TearDown network for sandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" successfully" May 8 00:54:29.555134 env[1234]: time="2025-05-08T00:54:29.555066594Z" level=info msg="RemovePodSandbox \"7a3dd6945ac061fdc2cd7a01fc4890a30ecb9522093f7edab9e14c3d410140d4\" returns successfully" May 8 00:54:29.555820 env[1234]: time="2025-05-08T00:54:29.555754055Z" level=info msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.588 [WARNING][4847] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--j4dtk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c1860d0-9041-4cb5-8c0a-5201c4257215", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8", Pod:"csi-node-driver-j4dtk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a70e0fdf3d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.588 [INFO][4847] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.588 [INFO][4847] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" iface="eth0" netns="" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.588 [INFO][4847] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.588 [INFO][4847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.607 [INFO][4855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.607 [INFO][4855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.607 [INFO][4855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.613 [WARNING][4855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.613 [INFO][4855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.615 [INFO][4855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.618611 env[1234]: 2025-05-08 00:54:29.616 [INFO][4847] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.619617 env[1234]: time="2025-05-08T00:54:29.618643670Z" level=info msg="TearDown network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" successfully" May 8 00:54:29.619617 env[1234]: time="2025-05-08T00:54:29.618679187Z" level=info msg="StopPodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" returns successfully" May 8 00:54:29.619617 env[1234]: time="2025-05-08T00:54:29.619288640Z" level=info msg="RemovePodSandbox for \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" May 8 00:54:29.619617 env[1234]: time="2025-05-08T00:54:29.619331281Z" level=info msg="Forcibly stopping sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\"" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.652 [WARNING][4877] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--j4dtk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c1860d0-9041-4cb5-8c0a-5201c4257215", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa5224a6fad498bf090c7c672769ff09aaa4710c26b22b1a3caf4e6ec85ae9f8", Pod:"csi-node-driver-j4dtk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a70e0fdf3d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.652 [INFO][4877] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.652 [INFO][4877] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" iface="eth0" netns="" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.652 [INFO][4877] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.652 [INFO][4877] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.672 [INFO][4885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.672 [INFO][4885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.672 [INFO][4885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.678 [WARNING][4885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.678 [INFO][4885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" HandleID="k8s-pod-network.bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" Workload="localhost-k8s-csi--node--driver--j4dtk-eth0" May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.679 [INFO][4885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:29.682294 env[1234]: 2025-05-08 00:54:29.680 [INFO][4877] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800" May 8 00:54:29.682294 env[1234]: time="2025-05-08T00:54:29.682242036Z" level=info msg="TearDown network for sandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" successfully" May 8 00:54:29.686044 env[1234]: time="2025-05-08T00:54:29.686015412Z" level=info msg="RemovePodSandbox \"bbf42b617a5fea5155863b44f3dad57698e439ad41a0db48cfc0e289e3849800\" returns successfully" May 8 00:54:30.365935 systemd[1]: Started sshd@15-10.0.0.137:22-10.0.0.1:40472.service. May 8 00:54:30.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.137:22-10.0.0.1:40472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:30.367108 kernel: kauditd_printk_skb: 137 callbacks suppressed May 8 00:54:30.367185 kernel: audit: type=1130 audit(1746665670.365:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.137:22-10.0.0.1:40472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:30.405000 audit[4893]: USER_ACCT pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.405768 sshd[4893]: Accepted publickey for core from 10.0.0.1 port 40472 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:30.408144 sshd[4893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:30.407000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.413101 kernel: audit: type=1101 audit(1746665670.405:1421): pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.413162 kernel: audit: type=1103 audit(1746665670.407:1422): pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.413198 kernel: audit: type=1006 audit(1746665670.407:1423): pid=4893 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 8 00:54:30.412786 systemd-logind[1220]: New session 16 of user core. May 8 00:54:30.413771 systemd[1]: Started session-16.scope. May 8 00:54:30.419277 kernel: audit: type=1300 audit(1746665670.407:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2fd0d50 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:30.407000 audit[4893]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2fd0d50 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:30.407000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:30.417000 audit[4893]: USER_START pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.425283 kernel: audit: type=1327 audit(1746665670.407:1423): proctitle=737368643A20636F7265205B707269765D May 8 00:54:30.425334 kernel: audit: type=1105 audit(1746665670.417:1424): pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.425359 kernel: audit: type=1103 audit(1746665670.419:1425): pid=4895 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.419000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.554858 sshd[4893]: pam_unix(sshd:session): session closed for user core May 8 00:54:30.555000 audit[4893]: USER_END pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.555000 audit[4893]: CRED_DISP pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.561754 systemd[1]: sshd@15-10.0.0.137:22-10.0.0.1:40472.service: Deactivated successfully. May 8 00:54:30.562549 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:54:30.563142 systemd-logind[1220]: Session 16 logged out. Waiting for processes to exit. May 8 00:54:30.563920 systemd-logind[1220]: Removed session 16. May 8 00:54:30.564364 kernel: audit: type=1106 audit(1746665670.555:1426): pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.564414 kernel: audit: type=1104 audit(1746665670.555:1427): pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:30.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.137:22-10.0.0.1:40472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:35.559155 systemd[1]: Started sshd@16-10.0.0.137:22-10.0.0.1:45374.service. May 8 00:54:35.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.137:22-10.0.0.1:45374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:35.560409 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:35.560476 kernel: audit: type=1130 audit(1746665675.558:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.137:22-10.0.0.1:45374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:35.593000 audit[4929]: USER_ACCT pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.593826 sshd[4929]: Accepted publickey for core from 10.0.0.1 port 45374 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:35.596575 sshd[4929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:35.595000 audit[4929]: CRED_ACQ pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.599720 systemd-logind[1220]: New session 17 of user core. May 8 00:54:35.600494 systemd[1]: Started session-17.scope. May 8 00:54:35.602772 kernel: audit: type=1101 audit(1746665675.593:1430): pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.602836 kernel: audit: type=1103 audit(1746665675.595:1431): pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.602866 kernel: audit: type=1006 audit(1746665675.595:1432): pid=4929 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 8 00:54:35.605741 kernel: audit: type=1300 audit(1746665675.595:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa4572d90 a2=3 a3=0 items=0 ppid=1 pid=4929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:35.595000 audit[4929]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa4572d90 a2=3 a3=0 items=0 ppid=1 pid=4929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:35.595000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:35.614700 kernel: audit: type=1327 audit(1746665675.595:1432): proctitle=737368643A20636F7265205B707269765D May 8 00:54:35.614740 kernel: audit: type=1105 audit(1746665675.604:1433): pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.604000 audit[4929]: USER_START pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.606000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.622264 kernel: audit: type=1103 audit(1746665675.606:1434): pid=4931 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.702056 sshd[4929]: pam_unix(sshd:session): session closed for user core May 8 00:54:35.702000 audit[4929]: USER_END pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.704698 systemd[1]: sshd@16-10.0.0.137:22-10.0.0.1:45374.service: Deactivated successfully. May 8 00:54:35.705463 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:54:35.702000 audit[4929]: CRED_DISP pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.710708 kernel: audit: type=1106 audit(1746665675.702:1435): pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.710769 kernel: audit: type=1104 audit(1746665675.702:1436): pid=4929 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:35.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.137:22-10.0.0.1:45374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:35.711305 systemd-logind[1220]: Session 17 logged out. Waiting for processes to exit. May 8 00:54:35.712057 systemd-logind[1220]: Removed session 17. May 8 00:54:39.869275 kubelet[2015]: E0508 00:54:39.869224 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:40.706613 systemd[1]: Started sshd@17-10.0.0.137:22-10.0.0.1:45378.service. May 8 00:54:40.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.137:22-10.0.0.1:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:40.707933 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:40.708013 kernel: audit: type=1130 audit(1746665680.706:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.137:22-10.0.0.1:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:40.744000 audit[4972]: USER_ACCT pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.744636 sshd[4972]: Accepted publickey for core from 10.0.0.1 port 45378 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:40.748398 kernel: audit: type=1101 audit(1746665680.744:1439): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.748000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.748781 sshd[4972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:40.752580 systemd-logind[1220]: New session 18 of user core. May 8 00:54:40.752868 systemd[1]: Started session-18.scope. May 8 00:54:40.754319 kernel: audit: type=1103 audit(1746665680.748:1440): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.754416 kernel: audit: type=1006 audit(1746665680.748:1441): pid=4972 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 8 00:54:40.754468 kernel: audit: type=1300 audit(1746665680.748:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4537fca0 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:40.748000 audit[4972]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4537fca0 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:40.758283 kernel: audit: type=1327 audit(1746665680.748:1441): proctitle=737368643A20636F7265205B707269765D May 8 00:54:40.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:40.757000 audit[4972]: USER_START pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.763858 kernel: audit: type=1105 audit(1746665680.757:1442): pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.763915 kernel: audit: type=1103 audit(1746665680.758:1443): pid=4974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.758000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.863867 sshd[4972]: pam_unix(sshd:session): session closed for user core May 8 00:54:40.864000 audit[4972]: USER_END pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.866960 systemd[1]: sshd@17-10.0.0.137:22-10.0.0.1:45378.service: Deactivated successfully. May 8 00:54:40.867525 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:54:40.868052 systemd-logind[1220]: Session 18 logged out. Waiting for processes to exit. May 8 00:54:40.869410 systemd[1]: Started sshd@18-10.0.0.137:22-10.0.0.1:45382.service. May 8 00:54:40.875085 kernel: audit: type=1106 audit(1746665680.864:1444): pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.875194 kernel: audit: type=1104 audit(1746665680.864:1445): pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.864000 audit[4972]: CRED_DISP pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.871751 systemd-logind[1220]: Removed session 18. May 8 00:54:40.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.137:22-10.0.0.1:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:40.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.137:22-10.0.0.1:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:40.897062 kubelet[2015]: I0508 00:54:40.896950 2015 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:40.907000 audit[4986]: USER_ACCT pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.907931 sshd[4986]: Accepted publickey for core from 10.0.0.1 port 45382 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:40.908000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.908000 audit[4986]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3c564e10 a2=3 a3=0 items=0 ppid=1 pid=4986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:40.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:40.909526 sshd[4986]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:40.913410 systemd-logind[1220]: New session 19 of user core. May 8 00:54:40.914469 systemd[1]: Started session-19.scope. May 8 00:54:40.919000 audit[4986]: USER_START pid=4986 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:40.921000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.184000 audit[4991]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:41.184000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffec855b2e0 a2=0 a3=7ffec855b2cc items=0 ppid=2160 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:41.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:41.189000 audit[4991]: NETFILTER_CFG table=nat:115 family=2 entries=34 op=nft_register_chain pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:41.189000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffec855b2e0 a2=0 a3=7ffec855b2cc items=0 ppid=2160 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:41.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:41.547321 sshd[4986]: pam_unix(sshd:session): session closed for user core May 8 00:54:41.547000 audit[4986]: USER_END pid=4986 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.547000 audit[4986]: CRED_DISP pid=4986 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.550779 systemd[1]: sshd@18-10.0.0.137:22-10.0.0.1:45382.service: Deactivated successfully. May 8 00:54:41.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.137:22-10.0.0.1:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:41.551426 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:54:41.554240 systemd[1]: Started sshd@19-10.0.0.137:22-10.0.0.1:45390.service. May 8 00:54:41.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.137:22-10.0.0.1:45390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:41.555039 systemd-logind[1220]: Session 19 logged out. Waiting for processes to exit. May 8 00:54:41.556217 systemd-logind[1220]: Removed session 19. May 8 00:54:41.593000 audit[4999]: USER_ACCT pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.595293 sshd[4999]: Accepted publickey for core from 10.0.0.1 port 45390 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:41.594000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.596436 sshd[4999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:41.594000 audit[4999]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3cd7a240 a2=3 a3=0 items=0 ppid=1 pid=4999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:41.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:41.601133 systemd-logind[1220]: New session 20 of user core. May 8 00:54:41.601652 systemd[1]: Started session-20.scope. May 8 00:54:41.607000 audit[4999]: USER_START pid=4999 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:41.607000 audit[5001]: CRED_ACQ pid=5001 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.221000 audit[5013]: NETFILTER_CFG table=filter:116 family=2 entries=20 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:43.221000 audit[5013]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc084f84a0 a2=0 a3=7ffc084f848c items=0 ppid=2160 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:43.227000 audit[5013]: NETFILTER_CFG table=nat:117 family=2 entries=22 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:43.227000 audit[5013]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc084f84a0 a2=0 a3=0 items=0 ppid=2160 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:43.233939 sshd[4999]: pam_unix(sshd:session): session closed for user core May 8 00:54:43.233000 audit[4999]: USER_END pid=4999 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.233000 audit[4999]: CRED_DISP pid=4999 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.137:22-10.0.0.1:45390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:43.236696 systemd[1]: sshd@19-10.0.0.137:22-10.0.0.1:45390.service: Deactivated successfully. May 8 00:54:43.237230 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:54:43.238518 systemd-logind[1220]: Session 20 logged out. Waiting for processes to exit. May 8 00:54:43.239129 systemd[1]: Started sshd@20-10.0.0.137:22-10.0.0.1:45404.service. May 8 00:54:43.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.137:22-10.0.0.1:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:43.240348 systemd-logind[1220]: Removed session 20. May 8 00:54:43.242000 audit[5018]: NETFILTER_CFG table=filter:118 family=2 entries=32 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:43.242000 audit[5018]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcf9cbdc70 a2=0 a3=7ffcf9cbdc5c items=0 ppid=2160 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:43.251000 audit[5018]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:43.251000 audit[5018]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcf9cbdc70 a2=0 a3=0 items=0 ppid=2160 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:43.276000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.278034 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 45404 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:43.277000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.277000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ee90050 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:43.279685 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:43.283037 systemd-logind[1220]: New session 21 of user core. May 8 00:54:43.283835 systemd[1]: Started session-21.scope. May 8 00:54:43.285000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.287000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.649349 sshd[5017]: pam_unix(sshd:session): session closed for user core May 8 00:54:43.648000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.649000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.137:22-10.0.0.1:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:43.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.137:22-10.0.0.1:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:43.652459 systemd[1]: sshd@20-10.0.0.137:22-10.0.0.1:45404.service: Deactivated successfully. May 8 00:54:43.653009 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:54:43.653668 systemd-logind[1220]: Session 21 logged out. Waiting for processes to exit. May 8 00:54:43.655048 systemd[1]: Started sshd@21-10.0.0.137:22-10.0.0.1:45412.service. May 8 00:54:43.655752 systemd-logind[1220]: Removed session 21. May 8 00:54:43.689000 audit[5030]: USER_ACCT pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.691205 sshd[5030]: Accepted publickey for core from 10.0.0.1 port 45412 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:43.690000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.690000 audit[5030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3506d7e0 a2=3 a3=0 items=0 ppid=1 pid=5030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:43.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:43.692616 sshd[5030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:43.696341 systemd-logind[1220]: New session 22 of user core. May 8 00:54:43.697464 systemd[1]: Started session-22.scope. May 8 00:54:43.700000 audit[5030]: USER_START pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.702000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.935624 sshd[5030]: pam_unix(sshd:session): session closed for user core May 8 00:54:43.935000 audit[5030]: USER_END pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.935000 audit[5030]: CRED_DISP pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:43.938088 systemd[1]: sshd@21-10.0.0.137:22-10.0.0.1:45412.service: Deactivated successfully. May 8 00:54:43.939031 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:54:43.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.137:22-10.0.0.1:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:43.939584 systemd-logind[1220]: Session 22 logged out. Waiting for processes to exit. May 8 00:54:43.940324 systemd-logind[1220]: Removed session 22. May 8 00:54:44.869170 kubelet[2015]: E0508 00:54:44.869120 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:45.097625 kubelet[2015]: E0508 00:54:45.097591 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:47.868997 kubelet[2015]: E0508 00:54:47.868943 2015 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:48.939752 systemd[1]: Started sshd@22-10.0.0.137:22-10.0.0.1:59668.service. May 8 00:54:48.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.137:22-10.0.0.1:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:48.976871 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:54:48.976952 kernel: audit: type=1130 audit(1746665688.938:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.137:22-10.0.0.1:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:49.011000 audit[5067]: USER_ACCT pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.012690 sshd[5067]: Accepted publickey for core from 10.0.0.1 port 59668 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:49.014969 sshd[5067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:49.013000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.016459 kernel: audit: type=1101 audit(1746665689.011:1490): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.016488 kernel: audit: type=1103 audit(1746665689.013:1491): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.018955 systemd-logind[1220]: New session 23 of user core. May 8 00:54:49.019356 systemd[1]: Started session-23.scope. May 8 00:54:49.023444 kernel: audit: type=1006 audit(1746665689.013:1492): pid=5067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 8 00:54:49.023515 kernel: audit: type=1300 audit(1746665689.013:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc4f834d0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:49.013000 audit[5067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc4f834d0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:49.013000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:49.027998 kernel: audit: type=1327 audit(1746665689.013:1492): proctitle=737368643A20636F7265205B707269765D May 8 00:54:49.026000 audit[5067]: USER_START pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.033884 kernel: audit: type=1105 audit(1746665689.026:1493): pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.033993 kernel: audit: type=1103 audit(1746665689.028:1494): pid=5069 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.028000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.139043 sshd[5067]: pam_unix(sshd:session): session closed for user core May 8 00:54:49.138000 audit[5067]: USER_END pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.141586 systemd[1]: sshd@22-10.0.0.137:22-10.0.0.1:59668.service: Deactivated successfully. May 8 00:54:49.142363 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:54:49.142935 systemd-logind[1220]: Session 23 logged out. Waiting for processes to exit. May 8 00:54:49.143771 systemd-logind[1220]: Removed session 23. May 8 00:54:49.138000 audit[5067]: CRED_DISP pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.147681 kernel: audit: type=1106 audit(1746665689.138:1495): pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.147737 kernel: audit: type=1104 audit(1746665689.138:1496): pid=5067 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:49.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.137:22-10.0.0.1:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:51.426000 audit[5080]: NETFILTER_CFG table=filter:120 family=2 entries=20 op=nft_register_rule pid=5080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:51.426000 audit[5080]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc1239cfa0 a2=0 a3=7ffc1239cf8c items=0 ppid=2160 pid=5080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:51.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:51.433000 audit[5080]: NETFILTER_CFG table=nat:121 family=2 entries=106 op=nft_register_chain pid=5080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:51.433000 audit[5080]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc1239cfa0 a2=0 a3=7ffc1239cf8c items=0 ppid=2160 pid=5080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:51.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:54.143554 systemd[1]: Started sshd@23-10.0.0.137:22-10.0.0.1:59682.service. May 8 00:54:54.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.137:22-10.0.0.1:59682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:54.144515 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:54:54.144580 kernel: audit: type=1130 audit(1746665694.142:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.137:22-10.0.0.1:59682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:54.176000 audit[5083]: USER_ACCT pid=5083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.177810 sshd[5083]: Accepted publickey for core from 10.0.0.1 port 59682 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:54.179461 sshd[5083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:54.177000 audit[5083]: CRED_ACQ pid=5083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.184400 systemd-logind[1220]: New session 24 of user core. May 8 00:54:54.185258 systemd[1]: Started session-24.scope. May 8 00:54:54.185396 kernel: audit: type=1101 audit(1746665694.176:1501): pid=5083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.185440 kernel: audit: type=1103 audit(1746665694.177:1502): pid=5083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.185460 kernel: audit: type=1006 audit(1746665694.177:1503): pid=5083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 8 00:54:54.177000 audit[5083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6b6029b0 a2=3 a3=0 items=0 ppid=1 pid=5083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:54.191818 kernel: audit: type=1300 audit(1746665694.177:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6b6029b0 a2=3 a3=0 items=0 ppid=1 pid=5083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:54.191860 kernel: audit: type=1327 audit(1746665694.177:1503): proctitle=737368643A20636F7265205B707269765D May 8 00:54:54.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:54.193163 kernel: audit: type=1105 audit(1746665694.188:1504): pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.188000 audit[5083]: USER_START pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.190000 audit[5085]: CRED_ACQ pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.200640 kernel: audit: type=1103 audit(1746665694.190:1505): pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.299944 sshd[5083]: pam_unix(sshd:session): session closed for user core May 8 00:54:54.299000 audit[5083]: USER_END pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.302510 systemd[1]: sshd@23-10.0.0.137:22-10.0.0.1:59682.service: Deactivated successfully. May 8 00:54:54.303423 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:54:54.304158 systemd-logind[1220]: Session 24 logged out. Waiting for processes to exit. May 8 00:54:54.304913 systemd-logind[1220]: Removed session 24. May 8 00:54:54.299000 audit[5083]: CRED_DISP pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.309025 kernel: audit: type=1106 audit(1746665694.299:1506): pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.309092 kernel: audit: type=1104 audit(1746665694.299:1507): pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:54.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.137:22-10.0.0.1:59682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:59.304024 systemd[1]: Started sshd@24-10.0.0.137:22-10.0.0.1:37828.service. May 8 00:54:59.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.137:22-10.0.0.1:37828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:59.305635 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:59.305691 kernel: audit: type=1130 audit(1746665699.302:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.137:22-10.0.0.1:37828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:59.337000 audit[5105]: USER_ACCT pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.338928 sshd[5105]: Accepted publickey for core from 10.0.0.1 port 37828 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:54:59.340954 sshd[5105]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:59.339000 audit[5105]: CRED_ACQ pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.347105 kernel: audit: type=1101 audit(1746665699.337:1510): pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.348844 kernel: audit: type=1103 audit(1746665699.339:1511): pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.348891 kernel: audit: type=1006 audit(1746665699.339:1512): pid=5105 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 8 00:54:59.347353 systemd-logind[1220]: New session 25 of user core. May 8 00:54:59.348429 systemd[1]: Started session-25.scope. May 8 00:54:59.339000 audit[5105]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebdd0a900 a2=3 a3=0 items=0 ppid=1 pid=5105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:59.354594 kernel: audit: type=1300 audit(1746665699.339:1512): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebdd0a900 a2=3 a3=0 items=0 ppid=1 pid=5105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:59.356139 kernel: audit: type=1327 audit(1746665699.339:1512): proctitle=737368643A20636F7265205B707269765D May 8 00:54:59.339000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:59.351000 audit[5105]: USER_START pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.360408 kernel: audit: type=1105 audit(1746665699.351:1513): pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.360454 kernel: audit: type=1103 audit(1746665699.353:1514): pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.353000 audit[5107]: CRED_ACQ pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.457790 sshd[5105]: pam_unix(sshd:session): session closed for user core May 8 00:54:59.457000 audit[5105]: USER_END pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.460435 systemd[1]: sshd@24-10.0.0.137:22-10.0.0.1:37828.service: Deactivated successfully. May 8 00:54:59.462683 systemd[1]: session-25.scope: Deactivated successfully. May 8 00:54:59.457000 audit[5105]: CRED_DISP pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.463957 systemd-logind[1220]: Session 25 logged out. Waiting for processes to exit. May 8 00:54:59.465306 systemd-logind[1220]: Removed session 25. May 8 00:54:59.466990 kernel: audit: type=1106 audit(1746665699.457:1515): pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.467057 kernel: audit: type=1104 audit(1746665699.457:1516): pid=5105 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:59.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.137:22-10.0.0.1:37828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:55:04.463232 systemd[1]: Started sshd@25-10.0.0.137:22-10.0.0.1:37840.service. May 8 00:55:04.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.137:22-10.0.0.1:37840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:55:04.467614 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:55:04.467672 kernel: audit: type=1130 audit(1746665704.461:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.137:22-10.0.0.1:37840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:55:04.496000 audit[5138]: USER_ACCT pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.497914 sshd[5138]: Accepted publickey for core from 10.0.0.1 port 37840 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:55:04.499853 sshd[5138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:55:04.498000 audit[5138]: CRED_ACQ pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.503207 systemd-logind[1220]: New session 26 of user core. May 8 00:55:04.503968 systemd[1]: Started session-26.scope. May 8 00:55:04.505249 kernel: audit: type=1101 audit(1746665704.496:1519): pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.505310 kernel: audit: type=1103 audit(1746665704.498:1520): pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.505382 kernel: audit: type=1006 audit(1746665704.498:1521): pid=5138 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 8 00:55:04.498000 audit[5138]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4876fc40 a2=3 a3=0 items=0 ppid=1 pid=5138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:55:04.511517 kernel: audit: type=1300 audit(1746665704.498:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4876fc40 a2=3 a3=0 items=0 ppid=1 pid=5138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:55:04.511572 kernel: audit: type=1327 audit(1746665704.498:1521): proctitle=737368643A20636F7265205B707269765D May 8 00:55:04.498000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:55:04.512852 kernel: audit: type=1105 audit(1746665704.510:1522): pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.510000 audit[5138]: USER_START pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.517054 kernel: audit: type=1103 audit(1746665704.511:1523): pid=5140 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.511000 audit[5140]: CRED_ACQ pid=5140 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.616210 sshd[5138]: pam_unix(sshd:session): session closed for user core May 8 00:55:04.615000 audit[5138]: USER_END pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.618506 systemd[1]: sshd@25-10.0.0.137:22-10.0.0.1:37840.service: Deactivated successfully. May 8 00:55:04.619230 systemd[1]: session-26.scope: Deactivated successfully. May 8 00:55:04.619740 systemd-logind[1220]: Session 26 logged out. Waiting for processes to exit. May 8 00:55:04.620410 systemd-logind[1220]: Removed session 26. May 8 00:55:04.615000 audit[5138]: CRED_DISP pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.625084 kernel: audit: type=1106 audit(1746665704.615:1524): pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.625145 kernel: audit: type=1104 audit(1746665704.615:1525): pid=5138 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:55:04.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.137:22-10.0.0.1:37840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'