May 8 00:39:02.079291 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 7 23:10:51 -00 2025 May 8 00:39:02.079313 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:39:02.079323 kernel: BIOS-provided physical RAM map: May 8 00:39:02.079328 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:39:02.079334 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:39:02.079339 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:39:02.079346 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:39:02.079352 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:39:02.079357 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:39:02.079364 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:39:02.079370 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 8 00:39:02.079375 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:39:02.079381 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:39:02.079387 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:39:02.079394 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:39:02.079402 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:39:02.079408 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:39:02.079413 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:39:02.079419 kernel: NX (Execute Disable) protection: active May 8 00:39:02.079425 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:39:02.079431 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:39:02.079437 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:39:02.079443 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:39:02.079449 kernel: extended physical RAM map: May 8 00:39:02.079455 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:39:02.079462 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:39:02.079468 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:39:02.079474 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:39:02.079480 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:39:02.079486 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:39:02.079495 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:39:02.079501 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 8 00:39:02.079507 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 8 00:39:02.079524 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 8 00:39:02.079530 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 8 00:39:02.079536 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 8 00:39:02.079543 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:39:02.079549 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:39:02.079555 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:39:02.079562 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:39:02.079570 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:39:02.079621 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:39:02.079629 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:39:02.079637 kernel: efi: EFI v2.70 by EDK II May 8 00:39:02.079643 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 8 00:39:02.079650 kernel: random: crng init done May 8 00:39:02.079656 kernel: SMBIOS 2.8 present. May 8 00:39:02.079663 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 8 00:39:02.079669 kernel: Hypervisor detected: KVM May 8 00:39:02.079675 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 8 00:39:02.079682 kernel: kvm-clock: cpu 0, msr 15198001, primary cpu clock May 8 00:39:02.079688 kernel: kvm-clock: using sched offset of 5475693395 cycles May 8 00:39:02.079699 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 8 00:39:02.079706 kernel: tsc: Detected 2794.748 MHz processor May 8 00:39:02.079713 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 8 00:39:02.079720 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 8 00:39:02.079726 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 8 00:39:02.079733 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 8 00:39:02.079740 kernel: Using GB pages for direct mapping May 8 00:39:02.079746 kernel: Secure boot disabled May 8 00:39:02.079753 kernel: ACPI: Early table checksum verification disabled May 8 00:39:02.079761 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 8 00:39:02.079768 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 8 00:39:02.079774 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079781 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079788 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 8 00:39:02.079794 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079801 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079808 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079814 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:39:02.079822 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 8 00:39:02.079829 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 8 00:39:02.079835 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 8 00:39:02.079842 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 8 00:39:02.079848 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 8 00:39:02.079855 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 8 00:39:02.079864 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 8 00:39:02.079870 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 8 00:39:02.079877 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 8 00:39:02.079885 kernel: No NUMA configuration found May 8 00:39:02.079892 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 8 00:39:02.079899 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 8 00:39:02.079905 kernel: Zone ranges: May 8 00:39:02.079912 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 8 00:39:02.079918 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 8 00:39:02.079925 kernel: Normal empty May 8 00:39:02.079931 kernel: Movable zone start for each node May 8 00:39:02.079938 kernel: Early memory node ranges May 8 00:39:02.079945 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 8 00:39:02.079952 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 8 00:39:02.079970 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 8 00:39:02.079977 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 8 00:39:02.079983 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 8 00:39:02.079990 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 8 00:39:02.079996 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 8 00:39:02.080003 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:39:02.080009 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 8 00:39:02.080016 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 8 00:39:02.080025 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:39:02.080031 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 8 00:39:02.080038 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 8 00:39:02.080044 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 8 00:39:02.080051 kernel: ACPI: PM-Timer IO Port: 0x608 May 8 00:39:02.080057 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 8 00:39:02.080064 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 8 00:39:02.080071 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 8 00:39:02.080077 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 8 00:39:02.080085 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 8 00:39:02.080092 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 8 00:39:02.080098 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 8 00:39:02.080107 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 8 00:39:02.080114 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 8 00:39:02.080120 kernel: TSC deadline timer available May 8 00:39:02.080127 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 8 00:39:02.080133 kernel: kvm-guest: KVM setup pv remote TLB flush May 8 00:39:02.080140 kernel: kvm-guest: setup PV sched yield May 8 00:39:02.080148 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 8 00:39:02.080155 kernel: Booting paravirtualized kernel on KVM May 8 00:39:02.080166 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 8 00:39:02.080175 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 8 00:39:02.080182 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 8 00:39:02.080189 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 8 00:39:02.080196 kernel: pcpu-alloc: [0] 0 1 2 3 May 8 00:39:02.080204 kernel: kvm-guest: setup async PF for cpu 0 May 8 00:39:02.080211 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 8 00:39:02.080218 kernel: kvm-guest: PV spinlocks enabled May 8 00:39:02.080225 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 8 00:39:02.080232 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 8 00:39:02.080248 kernel: Policy zone: DMA32 May 8 00:39:02.080256 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:39:02.080264 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:39:02.080271 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:39:02.080279 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:39:02.080286 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:39:02.080294 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2279K rwdata, 13724K rodata, 47464K init, 4116K bss, 169308K reserved, 0K cma-reserved) May 8 00:39:02.080301 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:39:02.080308 kernel: ftrace: allocating 34584 entries in 136 pages May 8 00:39:02.080315 kernel: ftrace: allocated 136 pages with 2 groups May 8 00:39:02.080322 kernel: rcu: Hierarchical RCU implementation. May 8 00:39:02.080329 kernel: rcu: RCU event tracing is enabled. May 8 00:39:02.080336 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:39:02.080344 kernel: Rude variant of Tasks RCU enabled. May 8 00:39:02.080351 kernel: Tracing variant of Tasks RCU enabled. May 8 00:39:02.080358 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:39:02.080365 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:39:02.080372 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 8 00:39:02.080379 kernel: Console: colour dummy device 80x25 May 8 00:39:02.080386 kernel: printk: console [ttyS0] enabled May 8 00:39:02.080393 kernel: ACPI: Core revision 20210730 May 8 00:39:02.080400 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 8 00:39:02.080409 kernel: APIC: Switch to symmetric I/O mode setup May 8 00:39:02.080415 kernel: x2apic enabled May 8 00:39:02.080422 kernel: Switched APIC routing to physical x2apic. May 8 00:39:02.080429 kernel: kvm-guest: setup PV IPIs May 8 00:39:02.080436 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 8 00:39:02.080443 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 8 00:39:02.080450 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 8 00:39:02.080457 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 8 00:39:02.080464 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 8 00:39:02.080472 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 8 00:39:02.080479 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 8 00:39:02.080486 kernel: Spectre V2 : Mitigation: Retpolines May 8 00:39:02.080493 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch May 8 00:39:02.080508 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT May 8 00:39:02.080546 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 8 00:39:02.080558 kernel: RETBleed: Mitigation: untrained return thunk May 8 00:39:02.080567 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 8 00:39:02.080575 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 8 00:39:02.081467 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 8 00:39:02.081480 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 8 00:39:02.081487 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 8 00:39:02.081494 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 8 00:39:02.081501 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 8 00:39:02.081508 kernel: Freeing SMP alternatives memory: 32K May 8 00:39:02.084465 kernel: pid_max: default: 32768 minimum: 301 May 8 00:39:02.084473 kernel: LSM: Security Framework initializing May 8 00:39:02.084480 kernel: SELinux: Initializing. May 8 00:39:02.084490 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:39:02.084497 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:39:02.084504 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 8 00:39:02.084523 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 8 00:39:02.084530 kernel: ... version: 0 May 8 00:39:02.084537 kernel: ... bit width: 48 May 8 00:39:02.084544 kernel: ... generic registers: 6 May 8 00:39:02.084551 kernel: ... value mask: 0000ffffffffffff May 8 00:39:02.084558 kernel: ... max period: 00007fffffffffff May 8 00:39:02.084567 kernel: ... fixed-purpose events: 0 May 8 00:39:02.084574 kernel: ... event mask: 000000000000003f May 8 00:39:02.084581 kernel: signal: max sigframe size: 1776 May 8 00:39:02.084588 kernel: rcu: Hierarchical SRCU implementation. May 8 00:39:02.084595 kernel: smp: Bringing up secondary CPUs ... May 8 00:39:02.084602 kernel: x86: Booting SMP configuration: May 8 00:39:02.084609 kernel: .... node #0, CPUs: #1 May 8 00:39:02.084616 kernel: kvm-clock: cpu 1, msr 15198041, secondary cpu clock May 8 00:39:02.084623 kernel: kvm-guest: setup async PF for cpu 1 May 8 00:39:02.084635 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 8 00:39:02.084643 kernel: #2 May 8 00:39:02.084650 kernel: kvm-clock: cpu 2, msr 15198081, secondary cpu clock May 8 00:39:02.084657 kernel: kvm-guest: setup async PF for cpu 2 May 8 00:39:02.084664 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 8 00:39:02.084671 kernel: #3 May 8 00:39:02.084678 kernel: kvm-clock: cpu 3, msr 151980c1, secondary cpu clock May 8 00:39:02.084685 kernel: kvm-guest: setup async PF for cpu 3 May 8 00:39:02.084692 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 8 00:39:02.084701 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:39:02.084708 kernel: smpboot: Max logical packages: 1 May 8 00:39:02.084715 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 8 00:39:02.084722 kernel: devtmpfs: initialized May 8 00:39:02.084729 kernel: x86/mm: Memory block size: 128MB May 8 00:39:02.084736 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 8 00:39:02.084743 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 8 00:39:02.084750 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 8 00:39:02.084757 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 8 00:39:02.084765 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 8 00:39:02.084772 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:39:02.084779 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:39:02.084786 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:39:02.084793 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:39:02.084800 kernel: audit: initializing netlink subsys (disabled) May 8 00:39:02.084807 kernel: audit: type=2000 audit(1746664741.432:1): state=initialized audit_enabled=0 res=1 May 8 00:39:02.084814 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:39:02.084821 kernel: thermal_sys: Registered thermal governor 'user_space' May 8 00:39:02.084829 kernel: cpuidle: using governor menu May 8 00:39:02.084836 kernel: ACPI: bus type PCI registered May 8 00:39:02.084843 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:39:02.084850 kernel: dca service started, version 1.12.1 May 8 00:39:02.084857 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 8 00:39:02.084864 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 8 00:39:02.084871 kernel: PCI: Using configuration type 1 for base access May 8 00:39:02.084878 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 8 00:39:02.084885 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:39:02.084893 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:39:02.084900 kernel: ACPI: Added _OSI(Module Device) May 8 00:39:02.084907 kernel: ACPI: Added _OSI(Processor Device) May 8 00:39:02.084914 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:39:02.084921 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:39:02.084927 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:39:02.084934 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:39:02.084941 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:39:02.084948 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:39:02.084956 kernel: ACPI: Interpreter enabled May 8 00:39:02.084963 kernel: ACPI: PM: (supports S0 S3 S5) May 8 00:39:02.084970 kernel: ACPI: Using IOAPIC for interrupt routing May 8 00:39:02.084977 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 8 00:39:02.084984 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 8 00:39:02.084991 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:39:02.085146 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:39:02.085227 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 8 00:39:02.085318 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 8 00:39:02.085327 kernel: PCI host bridge to bus 0000:00 May 8 00:39:02.088687 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 8 00:39:02.088756 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 8 00:39:02.088822 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 8 00:39:02.088886 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 8 00:39:02.088949 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 8 00:39:02.089019 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 8 00:39:02.089087 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:39:02.089190 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 8 00:39:02.089291 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 8 00:39:02.089367 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 8 00:39:02.089442 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 8 00:39:02.089545 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 8 00:39:02.089621 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 8 00:39:02.089695 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 8 00:39:02.089797 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:39:02.089879 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 8 00:39:02.089955 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 8 00:39:02.090029 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 8 00:39:02.090121 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 8 00:39:02.090196 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 8 00:39:02.090280 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 8 00:39:02.090356 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 8 00:39:02.090445 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 8 00:39:02.090536 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 8 00:39:02.090613 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 8 00:39:02.090690 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 8 00:39:02.090763 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 8 00:39:02.090848 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 8 00:39:02.090925 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 8 00:39:02.091013 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 8 00:39:02.091089 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 8 00:39:02.091163 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 8 00:39:02.091256 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 8 00:39:02.091333 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 8 00:39:02.091343 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 8 00:39:02.091351 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 8 00:39:02.091358 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 8 00:39:02.091365 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 8 00:39:02.091372 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 8 00:39:02.091387 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 8 00:39:02.091394 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 8 00:39:02.091401 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 8 00:39:02.091408 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 8 00:39:02.091415 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 8 00:39:02.091422 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 8 00:39:02.091429 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 8 00:39:02.091435 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 8 00:39:02.091442 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 8 00:39:02.091467 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 8 00:39:02.091475 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 8 00:39:02.091482 kernel: iommu: Default domain type: Translated May 8 00:39:02.091488 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 8 00:39:02.091662 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 8 00:39:02.091760 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 8 00:39:02.091854 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 8 00:39:02.091865 kernel: vgaarb: loaded May 8 00:39:02.091872 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:39:02.091883 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:39:02.091891 kernel: PTP clock support registered May 8 00:39:02.091898 kernel: Registered efivars operations May 8 00:39:02.091904 kernel: PCI: Using ACPI for IRQ routing May 8 00:39:02.091912 kernel: PCI: pci_cache_line_size set to 64 bytes May 8 00:39:02.091919 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 8 00:39:02.091926 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 8 00:39:02.091933 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 8 00:39:02.091939 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 8 00:39:02.091962 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 8 00:39:02.091970 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 8 00:39:02.091977 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 8 00:39:02.091984 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 8 00:39:02.091991 kernel: clocksource: Switched to clocksource kvm-clock May 8 00:39:02.091998 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:39:02.092005 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:39:02.092012 kernel: pnp: PnP ACPI init May 8 00:39:02.092138 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 8 00:39:02.092154 kernel: pnp: PnP ACPI: found 6 devices May 8 00:39:02.092161 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 8 00:39:02.092168 kernel: NET: Registered PF_INET protocol family May 8 00:39:02.092175 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:39:02.092195 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:39:02.092203 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:39:02.092210 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:39:02.092217 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:39:02.092227 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:39:02.092254 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:39:02.092261 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:39:02.092269 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:39:02.092276 kernel: NET: Registered PF_XDP protocol family May 8 00:39:02.092392 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 8 00:39:02.092520 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 8 00:39:02.092632 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 8 00:39:02.092726 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 8 00:39:02.092831 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 8 00:39:02.092932 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 8 00:39:02.093040 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 8 00:39:02.093132 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 8 00:39:02.093143 kernel: PCI: CLS 0 bytes, default 64 May 8 00:39:02.093151 kernel: Initialise system trusted keyrings May 8 00:39:02.093158 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:39:02.093168 kernel: Key type asymmetric registered May 8 00:39:02.093175 kernel: Asymmetric key parser 'x509' registered May 8 00:39:02.093183 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:39:02.093200 kernel: io scheduler mq-deadline registered May 8 00:39:02.093208 kernel: io scheduler kyber registered May 8 00:39:02.093215 kernel: io scheduler bfq registered May 8 00:39:02.093223 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 8 00:39:02.093230 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 8 00:39:02.093238 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 8 00:39:02.093257 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 8 00:39:02.093265 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:39:02.093272 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 8 00:39:02.093279 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 8 00:39:02.093287 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 8 00:39:02.093294 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 8 00:39:02.093390 kernel: rtc_cmos 00:04: RTC can wake from S4 May 8 00:39:02.093402 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 8 00:39:02.093469 kernel: rtc_cmos 00:04: registered as rtc0 May 8 00:39:02.093621 kernel: rtc_cmos 00:04: setting system clock to 2025-05-08T00:39:01 UTC (1746664741) May 8 00:39:02.093692 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 8 00:39:02.093701 kernel: efifb: probing for efifb May 8 00:39:02.093709 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 8 00:39:02.093716 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 8 00:39:02.093723 kernel: efifb: scrolling: redraw May 8 00:39:02.093731 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 8 00:39:02.093738 kernel: Console: switching to colour frame buffer device 160x50 May 8 00:39:02.093749 kernel: fb0: EFI VGA frame buffer device May 8 00:39:02.093756 kernel: pstore: Registered efi as persistent store backend May 8 00:39:02.093764 kernel: NET: Registered PF_INET6 protocol family May 8 00:39:02.093771 kernel: Segment Routing with IPv6 May 8 00:39:02.093780 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:39:02.093787 kernel: NET: Registered PF_PACKET protocol family May 8 00:39:02.093796 kernel: Key type dns_resolver registered May 8 00:39:02.093803 kernel: IPI shorthand broadcast: enabled May 8 00:39:02.093811 kernel: sched_clock: Marking stable (492560336, 138308430)->(689078845, -58210079) May 8 00:39:02.093818 kernel: registered taskstats version 1 May 8 00:39:02.093825 kernel: Loading compiled-in X.509 certificates May 8 00:39:02.093833 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: c9ff13353458e6fa2786638fdd3dcad841d1075c' May 8 00:39:02.093840 kernel: Key type .fscrypt registered May 8 00:39:02.093847 kernel: Key type fscrypt-provisioning registered May 8 00:39:02.093855 kernel: pstore: Using crash dump compression: deflate May 8 00:39:02.093864 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:39:02.093871 kernel: ima: Allocated hash algorithm: sha1 May 8 00:39:02.093878 kernel: ima: No architecture policies found May 8 00:39:02.093885 kernel: clk: Disabling unused clocks May 8 00:39:02.093892 kernel: Freeing unused kernel image (initmem) memory: 47464K May 8 00:39:02.093900 kernel: Write protecting the kernel read-only data: 28672k May 8 00:39:02.093907 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 8 00:39:02.093914 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 8 00:39:02.093922 kernel: Run /init as init process May 8 00:39:02.093931 kernel: with arguments: May 8 00:39:02.093938 kernel: /init May 8 00:39:02.093945 kernel: with environment: May 8 00:39:02.093952 kernel: HOME=/ May 8 00:39:02.093959 kernel: TERM=linux May 8 00:39:02.093966 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:39:02.093976 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:39:02.093985 systemd[1]: Detected virtualization kvm. May 8 00:39:02.093995 systemd[1]: Detected architecture x86-64. May 8 00:39:02.094002 systemd[1]: Running in initrd. May 8 00:39:02.094010 systemd[1]: No hostname configured, using default hostname. May 8 00:39:02.094017 systemd[1]: Hostname set to . May 8 00:39:02.094025 systemd[1]: Initializing machine ID from VM UUID. May 8 00:39:02.094033 systemd[1]: Queued start job for default target initrd.target. May 8 00:39:02.094041 systemd[1]: Started systemd-ask-password-console.path. May 8 00:39:02.094048 systemd[1]: Reached target cryptsetup.target. May 8 00:39:02.094057 systemd[1]: Reached target paths.target. May 8 00:39:02.094065 systemd[1]: Reached target slices.target. May 8 00:39:02.094072 systemd[1]: Reached target swap.target. May 8 00:39:02.094080 systemd[1]: Reached target timers.target. May 8 00:39:02.094088 systemd[1]: Listening on iscsid.socket. May 8 00:39:02.094096 systemd[1]: Listening on iscsiuio.socket. May 8 00:39:02.094103 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:39:02.094111 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:39:02.094120 systemd[1]: Listening on systemd-journald.socket. May 8 00:39:02.094128 systemd[1]: Listening on systemd-networkd.socket. May 8 00:39:02.094137 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:39:02.094145 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:39:02.094152 systemd[1]: Reached target sockets.target. May 8 00:39:02.094160 systemd[1]: Starting kmod-static-nodes.service... May 8 00:39:02.094167 systemd[1]: Finished network-cleanup.service. May 8 00:39:02.094175 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:39:02.094183 systemd[1]: Starting systemd-journald.service... May 8 00:39:02.094192 systemd[1]: Starting systemd-modules-load.service... May 8 00:39:02.094199 systemd[1]: Starting systemd-resolved.service... May 8 00:39:02.094207 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:39:02.094215 systemd[1]: Finished kmod-static-nodes.service. May 8 00:39:02.094223 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:39:02.094230 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:39:02.094238 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:39:02.094254 kernel: audit: type=1130 audit(1746664742.080:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.094264 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:39:02.094272 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:39:02.094280 kernel: audit: type=1130 audit(1746664742.087:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.094291 systemd-journald[198]: Journal started May 8 00:39:02.094332 systemd-journald[198]: Runtime Journal (/run/log/journal/f7ac5d70947144748f718c198cc2a0c8) is 6.0M, max 48.4M, 42.4M free. May 8 00:39:02.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.081487 systemd-modules-load[199]: Inserted module 'overlay' May 8 00:39:02.100054 systemd[1]: Started systemd-journald.service. May 8 00:39:02.100069 kernel: audit: type=1130 audit(1746664742.095:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.101101 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:39:02.107347 kernel: audit: type=1130 audit(1746664742.101:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.102813 systemd[1]: Starting dracut-cmdline.service... May 8 00:39:02.103499 systemd-resolved[200]: Positive Trust Anchors: May 8 00:39:02.103528 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:39:02.103571 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:39:02.106652 systemd-resolved[200]: Defaulting to hostname 'linux'. May 8 00:39:02.108229 systemd[1]: Started systemd-resolved.service. May 8 00:39:02.111267 systemd[1]: Reached target nss-lookup.target. May 8 00:39:02.112526 dracut-cmdline[217]: dracut-dracut-053 May 8 00:39:02.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.116539 kernel: audit: type=1130 audit(1746664742.109:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.117098 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:39:02.131528 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:39:02.137093 systemd-modules-load[199]: Inserted module 'br_netfilter' May 8 00:39:02.138087 kernel: Bridge firewalling registered May 8 00:39:02.157555 kernel: SCSI subsystem initialized May 8 00:39:02.170810 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:39:02.170870 kernel: device-mapper: uevent: version 1.0.3 May 8 00:39:02.170891 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:39:02.173629 systemd-modules-load[199]: Inserted module 'dm_multipath' May 8 00:39:02.174988 systemd[1]: Finished systemd-modules-load.service. May 8 00:39:02.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.178012 systemd[1]: Starting systemd-sysctl.service... May 8 00:39:02.181083 kernel: audit: type=1130 audit(1746664742.176:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.183544 kernel: Loading iSCSI transport class v2.0-870. May 8 00:39:02.188064 systemd[1]: Finished systemd-sysctl.service. May 8 00:39:02.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.193556 kernel: audit: type=1130 audit(1746664742.189:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.206534 kernel: iscsi: registered transport (tcp) May 8 00:39:02.229721 kernel: iscsi: registered transport (qla4xxx) May 8 00:39:02.229778 kernel: QLogic iSCSI HBA Driver May 8 00:39:02.262307 systemd[1]: Finished dracut-cmdline.service. May 8 00:39:02.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.289929 systemd[1]: Starting dracut-pre-udev.service... May 8 00:39:02.293311 kernel: audit: type=1130 audit(1746664742.288:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.347548 kernel: raid6: avx2x4 gen() 26771 MB/s May 8 00:39:02.364538 kernel: raid6: avx2x4 xor() 8105 MB/s May 8 00:39:02.401542 kernel: raid6: avx2x2 gen() 32554 MB/s May 8 00:39:02.450550 kernel: raid6: avx2x2 xor() 19207 MB/s May 8 00:39:02.467569 kernel: raid6: avx2x1 gen() 24432 MB/s May 8 00:39:02.484583 kernel: raid6: avx2x1 xor() 15046 MB/s May 8 00:39:02.501595 kernel: raid6: sse2x4 gen() 14277 MB/s May 8 00:39:02.518547 kernel: raid6: sse2x4 xor() 6973 MB/s May 8 00:39:02.539585 kernel: raid6: sse2x2 gen() 14857 MB/s May 8 00:39:02.556574 kernel: raid6: sse2x2 xor() 8654 MB/s May 8 00:39:02.573589 kernel: raid6: sse2x1 gen() 12388 MB/s May 8 00:39:02.590983 kernel: raid6: sse2x1 xor() 7800 MB/s May 8 00:39:02.591074 kernel: raid6: using algorithm avx2x2 gen() 32554 MB/s May 8 00:39:02.591090 kernel: raid6: .... xor() 19207 MB/s, rmw enabled May 8 00:39:02.591657 kernel: raid6: using avx2x2 recovery algorithm May 8 00:39:02.604548 kernel: xor: automatically using best checksumming function avx May 8 00:39:02.708552 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 8 00:39:02.716489 systemd[1]: Finished dracut-pre-udev.service. May 8 00:39:02.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.721000 audit: BPF prog-id=7 op=LOAD May 8 00:39:02.721000 audit: BPF prog-id=8 op=LOAD May 8 00:39:02.721531 kernel: audit: type=1130 audit(1746664742.717:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.721838 systemd[1]: Starting systemd-udevd.service... May 8 00:39:02.735523 systemd-udevd[402]: Using default interface naming scheme 'v252'. May 8 00:39:02.739671 systemd[1]: Started systemd-udevd.service. May 8 00:39:02.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.742499 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:39:02.752447 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation May 8 00:39:02.774296 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:39:02.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.776858 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:39:02.814524 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:39:02.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:02.842004 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:39:02.848994 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:39:02.849008 kernel: GPT:9289727 != 19775487 May 8 00:39:02.849017 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:39:02.849025 kernel: GPT:9289727 != 19775487 May 8 00:39:02.849033 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:39:02.849042 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:39:02.854548 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:39:02.857536 kernel: libata version 3.00 loaded. May 8 00:39:02.865710 kernel: ahci 0000:00:1f.2: version 3.0 May 8 00:39:02.928647 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 8 00:39:02.928665 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 8 00:39:02.928772 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 8 00:39:02.928854 kernel: AVX2 version of gcm_enc/dec engaged. May 8 00:39:02.928872 kernel: scsi host0: ahci May 8 00:39:02.928996 kernel: AES CTR mode by8 optimization enabled May 8 00:39:02.929009 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) May 8 00:39:02.929018 kernel: scsi host1: ahci May 8 00:39:02.929110 kernel: scsi host2: ahci May 8 00:39:02.929200 kernel: scsi host3: ahci May 8 00:39:02.929309 kernel: scsi host4: ahci May 8 00:39:02.929776 kernel: scsi host5: ahci May 8 00:39:02.929903 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 8 00:39:02.929913 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 8 00:39:02.929923 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 8 00:39:02.929931 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 8 00:39:02.929940 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 8 00:39:02.929949 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 8 00:39:02.909061 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:39:02.915348 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:39:02.916487 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:39:02.923964 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:39:02.938747 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:39:02.940951 systemd[1]: Starting disk-uuid.service... May 8 00:39:03.211321 disk-uuid[530]: Primary Header is updated. May 8 00:39:03.211321 disk-uuid[530]: Secondary Entries is updated. May 8 00:39:03.211321 disk-uuid[530]: Secondary Header is updated. May 8 00:39:03.215046 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:39:03.248172 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 8 00:39:03.248251 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 8 00:39:03.248267 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 8 00:39:03.248276 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 8 00:39:03.248286 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 8 00:39:03.248294 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 8 00:39:03.261482 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 8 00:39:03.261577 kernel: ata3.00: applying bridge limits May 8 00:39:03.263627 kernel: ata3.00: configured for UDMA/100 May 8 00:39:03.264569 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 8 00:39:03.298627 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 8 00:39:03.316171 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 8 00:39:03.316183 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 8 00:39:04.223559 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:39:04.223701 disk-uuid[531]: The operation has completed successfully. May 8 00:39:04.248400 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:39:04.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.248492 systemd[1]: Finished disk-uuid.service. May 8 00:39:04.256900 systemd[1]: Starting verity-setup.service... May 8 00:39:04.273551 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 8 00:39:04.297702 systemd[1]: Found device dev-mapper-usr.device. May 8 00:39:04.299150 systemd[1]: Mounting sysusr-usr.mount... May 8 00:39:04.301747 systemd[1]: Finished verity-setup.service. May 8 00:39:04.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.366556 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:39:04.366960 systemd[1]: Mounted sysusr-usr.mount. May 8 00:39:04.367575 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:39:04.368451 systemd[1]: Starting ignition-setup.service... May 8 00:39:04.369617 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:39:04.381083 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:39:04.381123 kernel: BTRFS info (device vda6): using free space tree May 8 00:39:04.381137 kernel: BTRFS info (device vda6): has skinny extents May 8 00:39:04.390175 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:39:04.400342 systemd[1]: Finished ignition-setup.service. May 8 00:39:04.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.401575 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:39:04.642994 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:39:04.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.644000 audit: BPF prog-id=9 op=LOAD May 8 00:39:04.645576 systemd[1]: Starting systemd-networkd.service... May 8 00:39:04.658745 ignition[651]: Ignition 2.14.0 May 8 00:39:04.658756 ignition[651]: Stage: fetch-offline May 8 00:39:04.658853 ignition[651]: no configs at "/usr/lib/ignition/base.d" May 8 00:39:04.658871 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:04.659013 ignition[651]: parsed url from cmdline: "" May 8 00:39:04.659018 ignition[651]: no config URL provided May 8 00:39:04.659025 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:39:04.659039 ignition[651]: no config at "/usr/lib/ignition/user.ign" May 8 00:39:04.659066 ignition[651]: op(1): [started] loading QEMU firmware config module May 8 00:39:04.659087 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:39:04.666676 ignition[651]: op(1): [finished] loading QEMU firmware config module May 8 00:39:04.666711 ignition[651]: QEMU firmware config was not found. Ignoring... May 8 00:39:04.671040 systemd-networkd[718]: lo: Link UP May 8 00:39:04.671049 systemd-networkd[718]: lo: Gained carrier May 8 00:39:04.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.671650 systemd-networkd[718]: Enumeration completed May 8 00:39:04.671740 systemd[1]: Started systemd-networkd.service. May 8 00:39:04.672332 systemd[1]: Reached target network.target. May 8 00:39:04.672680 systemd-networkd[718]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:39:04.675805 systemd[1]: Starting iscsiuio.service... May 8 00:39:04.677556 systemd-networkd[718]: eth0: Link UP May 8 00:39:04.677560 systemd-networkd[718]: eth0: Gained carrier May 8 00:39:04.712091 systemd[1]: Started iscsiuio.service. May 8 00:39:04.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.713773 systemd[1]: Starting iscsid.service... May 8 00:39:04.718158 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:39:04.718158 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:39:04.718158 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:39:04.718158 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:39:04.718158 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:39:04.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.731950 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:39:04.722153 systemd[1]: Started iscsid.service. May 8 00:39:04.733294 ignition[651]: parsing config with SHA512: 1900cffd667f8bef77a55b6aa00aa0e656ebfe0b4a9947241fb0b57c1e93a48d93b65e7f608e74f1cf24bcc67bab05a65ac9f40d0940bea37ecd943b07dd0197 May 8 00:39:04.727489 systemd[1]: Starting dracut-initqueue.service... May 8 00:39:04.741869 systemd[1]: Finished dracut-initqueue.service. May 8 00:39:04.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.742840 systemd[1]: Reached target remote-fs-pre.target. May 8 00:39:04.744632 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:39:04.745719 systemd[1]: Reached target remote-fs.target. May 8 00:39:04.747496 systemd[1]: Starting dracut-pre-mount.service... May 8 00:39:04.761690 systemd[1]: Finished dracut-pre-mount.service. May 8 00:39:04.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.766888 unknown[651]: fetched base config from "system" May 8 00:39:04.766899 unknown[651]: fetched user config from "qemu" May 8 00:39:04.767451 ignition[651]: fetch-offline: fetch-offline passed May 8 00:39:04.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.768567 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:39:04.767541 ignition[651]: Ignition finished successfully May 8 00:39:04.769626 systemd-networkd[718]: eth0: DHCPv4 address 10.0.0.23/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:39:04.770096 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:39:04.770909 systemd[1]: Starting ignition-kargs.service... May 8 00:39:04.779971 ignition[739]: Ignition 2.14.0 May 8 00:39:04.779979 ignition[739]: Stage: kargs May 8 00:39:04.780067 ignition[739]: no configs at "/usr/lib/ignition/base.d" May 8 00:39:04.780075 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:04.782825 systemd[1]: Finished ignition-kargs.service. May 8 00:39:04.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.781026 ignition[739]: kargs: kargs passed May 8 00:39:04.785635 systemd[1]: Starting ignition-disks.service... May 8 00:39:04.781060 ignition[739]: Ignition finished successfully May 8 00:39:04.800329 ignition[745]: Ignition 2.14.0 May 8 00:39:04.800341 ignition[745]: Stage: disks May 8 00:39:04.800478 ignition[745]: no configs at "/usr/lib/ignition/base.d" May 8 00:39:04.800492 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:04.806611 ignition[745]: disks: disks passed May 8 00:39:04.807377 ignition[745]: Ignition finished successfully May 8 00:39:04.809134 systemd[1]: Finished ignition-disks.service. May 8 00:39:04.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.809943 systemd[1]: Reached target initrd-root-device.target. May 8 00:39:04.811315 systemd[1]: Reached target local-fs-pre.target. May 8 00:39:04.812913 systemd[1]: Reached target local-fs.target. May 8 00:39:04.814853 systemd[1]: Reached target sysinit.target. May 8 00:39:04.816348 systemd[1]: Reached target basic.target. May 8 00:39:04.819388 systemd[1]: Starting systemd-fsck-root.service... May 8 00:39:04.872328 systemd-fsck[754]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 8 00:39:04.879815 systemd[1]: Finished systemd-fsck-root.service. May 8 00:39:04.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.881330 systemd[1]: Mounting sysroot.mount... May 8 00:39:04.887534 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:39:04.888093 systemd[1]: Mounted sysroot.mount. May 8 00:39:04.888807 systemd[1]: Reached target initrd-root-fs.target. May 8 00:39:04.891104 systemd[1]: Mounting sysroot-usr.mount... May 8 00:39:04.892266 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:39:04.892307 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:39:04.892332 systemd[1]: Reached target ignition-diskful.target. May 8 00:39:04.894009 systemd[1]: Mounted sysroot-usr.mount. May 8 00:39:04.896433 systemd[1]: Starting initrd-setup-root.service... May 8 00:39:04.901372 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:39:04.903290 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 8 00:39:04.906778 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:39:04.910211 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:39:04.934912 systemd[1]: Finished initrd-setup-root.service. May 8 00:39:04.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.936504 systemd[1]: Starting ignition-mount.service... May 8 00:39:04.937773 systemd[1]: Starting sysroot-boot.service... May 8 00:39:04.942177 bash[805]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:39:04.979270 ignition[806]: INFO : Ignition 2.14.0 May 8 00:39:04.980303 ignition[806]: INFO : Stage: mount May 8 00:39:04.980303 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:39:04.980303 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:04.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.984063 ignition[806]: INFO : mount: mount passed May 8 00:39:04.984063 ignition[806]: INFO : Ignition finished successfully May 8 00:39:04.981764 systemd[1]: Finished ignition-mount.service. May 8 00:39:04.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:04.985987 systemd[1]: Finished sysroot-boot.service. May 8 00:39:05.309485 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:39:05.318204 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) May 8 00:39:05.318233 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:39:05.318244 kernel: BTRFS info (device vda6): using free space tree May 8 00:39:05.318992 kernel: BTRFS info (device vda6): has skinny extents May 8 00:39:05.322619 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:39:05.324211 systemd[1]: Starting ignition-files.service... May 8 00:39:05.341358 ignition[835]: INFO : Ignition 2.14.0 May 8 00:39:05.341358 ignition[835]: INFO : Stage: files May 8 00:39:05.343174 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:39:05.343174 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:05.343174 ignition[835]: DEBUG : files: compiled without relabeling support, skipping May 8 00:39:05.346892 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:39:05.346892 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:39:05.350116 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:39:05.351735 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:39:05.353331 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:39:05.353331 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 8 00:39:05.353331 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 8 00:39:05.352406 unknown[835]: wrote ssh authorized keys file for user: core May 8 00:39:05.435140 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:39:05.554296 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 8 00:39:05.554296 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:39:05.559082 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:39:05.559082 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:39:05.562849 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:39:05.562849 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:39:05.566707 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:39:05.566707 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:39:05.570613 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:39:05.572477 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:39:05.574340 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:39:05.576104 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:39:05.578595 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:39:05.581091 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:39:05.583438 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 8 00:39:05.745773 systemd-networkd[718]: eth0: Gained IPv6LL May 8 00:39:05.860315 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:39:06.590433 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:39:06.590433 ignition[835]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:39:06.594362 ignition[835]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:39:06.639988 ignition[835]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:39:06.641762 ignition[835]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:39:06.641762 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:39:06.641762 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:39:06.641762 ignition[835]: INFO : files: files passed May 8 00:39:06.641762 ignition[835]: INFO : Ignition finished successfully May 8 00:39:06.649392 systemd[1]: Finished ignition-files.service. May 8 00:39:06.654633 kernel: kauditd_printk_skb: 23 callbacks suppressed May 8 00:39:06.654654 kernel: audit: type=1130 audit(1746664746.649:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.650732 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:39:06.654851 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:39:06.655560 systemd[1]: Starting ignition-quench.service... May 8 00:39:06.666112 kernel: audit: type=1130 audit(1746664746.658:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.666152 kernel: audit: type=1131 audit(1746664746.658:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.658600 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:39:06.658705 systemd[1]: Finished ignition-quench.service. May 8 00:39:06.669053 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:39:06.672132 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:39:06.672924 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:39:06.679257 kernel: audit: type=1130 audit(1746664746.673:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.674548 systemd[1]: Reached target ignition-complete.target. May 8 00:39:06.681743 systemd[1]: Starting initrd-parse-etc.service... May 8 00:39:06.694789 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:39:06.694877 systemd[1]: Finished initrd-parse-etc.service. May 8 00:39:06.704094 kernel: audit: type=1130 audit(1746664746.696:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.704138 kernel: audit: type=1131 audit(1746664746.696:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.696834 systemd[1]: Reached target initrd-fs.target. May 8 00:39:06.703037 systemd[1]: Reached target initrd.target. May 8 00:39:06.704434 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:39:06.705166 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:39:06.717442 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:39:06.722342 kernel: audit: type=1130 audit(1746664746.717:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.722346 systemd[1]: Starting initrd-cleanup.service... May 8 00:39:06.734438 systemd[1]: Stopped target nss-lookup.target. May 8 00:39:06.735078 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:39:06.735492 systemd[1]: Stopped target timers.target. May 8 00:39:06.739238 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:39:06.745370 kernel: audit: type=1131 audit(1746664746.739:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.739415 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:39:06.740644 systemd[1]: Stopped target initrd.target. May 8 00:39:06.746094 systemd[1]: Stopped target basic.target. May 8 00:39:06.748066 systemd[1]: Stopped target ignition-complete.target. May 8 00:39:06.749551 systemd[1]: Stopped target ignition-diskful.target. May 8 00:39:06.752056 systemd[1]: Stopped target initrd-root-device.target. May 8 00:39:06.753776 systemd[1]: Stopped target remote-fs.target. May 8 00:39:06.755193 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:39:06.756560 systemd[1]: Stopped target sysinit.target. May 8 00:39:06.758534 systemd[1]: Stopped target local-fs.target. May 8 00:39:06.759159 systemd[1]: Stopped target local-fs-pre.target. May 8 00:39:06.759529 systemd[1]: Stopped target swap.target. May 8 00:39:06.767811 kernel: audit: type=1131 audit(1746664746.763:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.762923 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:39:06.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.763070 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:39:06.776091 kernel: audit: type=1131 audit(1746664746.770:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.763622 systemd[1]: Stopped target cryptsetup.target. May 8 00:39:06.769538 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:39:06.769646 systemd[1]: Stopped dracut-initqueue.service. May 8 00:39:06.770970 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:39:06.771080 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:39:06.774844 systemd[1]: Stopped target paths.target. May 8 00:39:06.776573 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:39:06.780617 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:39:06.781426 systemd[1]: Stopped target slices.target. May 8 00:39:06.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.783032 systemd[1]: Stopped target sockets.target. May 8 00:39:06.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.786111 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:39:06.786294 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:39:06.792574 iscsid[724]: iscsid shutting down. May 8 00:39:06.786795 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:39:06.786886 systemd[1]: Stopped ignition-files.service. May 8 00:39:06.790156 systemd[1]: Stopping ignition-mount.service... May 8 00:39:06.790942 systemd[1]: Stopping iscsid.service... May 8 00:39:06.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.793814 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:39:06.793934 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:39:06.802135 ignition[875]: INFO : Ignition 2.14.0 May 8 00:39:06.802135 ignition[875]: INFO : Stage: umount May 8 00:39:06.802135 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:39:06.802135 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:39:06.802135 ignition[875]: INFO : umount: umount passed May 8 00:39:06.802135 ignition[875]: INFO : Ignition finished successfully May 8 00:39:06.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.798984 systemd[1]: Stopping sysroot-boot.service... May 8 00:39:06.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.800485 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:39:06.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.800621 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:39:06.802276 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:39:06.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.802396 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:39:06.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.805776 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:39:06.805862 systemd[1]: Stopped iscsid.service. May 8 00:39:06.808020 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:39:06.808095 systemd[1]: Stopped ignition-mount.service. May 8 00:39:06.809596 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:39:06.809663 systemd[1]: Closed iscsid.socket. May 8 00:39:06.810929 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:39:06.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.810964 systemd[1]: Stopped ignition-disks.service. May 8 00:39:06.812587 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:39:06.812630 systemd[1]: Stopped ignition-kargs.service. May 8 00:39:06.813654 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:39:06.813687 systemd[1]: Stopped ignition-setup.service. May 8 00:39:06.814897 systemd[1]: Stopping iscsiuio.service... May 8 00:39:06.816975 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:39:06.817436 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:39:06.817530 systemd[1]: Finished initrd-cleanup.service. May 8 00:39:06.818939 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:39:06.819010 systemd[1]: Stopped iscsiuio.service. May 8 00:39:06.823759 systemd[1]: Stopped target network.target. May 8 00:39:06.824743 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:39:06.824772 systemd[1]: Closed iscsiuio.socket. May 8 00:39:06.826141 systemd[1]: Stopping systemd-networkd.service... May 8 00:39:06.827922 systemd[1]: Stopping systemd-resolved.service... May 8 00:39:06.829550 systemd-networkd[718]: eth0: DHCPv6 lease lost May 8 00:39:06.830461 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:39:06.830559 systemd[1]: Stopped systemd-networkd.service. May 8 00:39:06.833079 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:39:06.833105 systemd[1]: Closed systemd-networkd.socket. May 8 00:39:06.835563 systemd[1]: Stopping network-cleanup.service... May 8 00:39:06.837030 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:39:06.837857 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:39:06.842000 audit: BPF prog-id=9 op=UNLOAD May 8 00:39:06.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.855844 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:39:06.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.855908 systemd[1]: Stopped systemd-sysctl.service. May 8 00:39:06.858148 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:39:06.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.859134 systemd[1]: Stopped systemd-modules-load.service. May 8 00:39:06.862299 systemd[1]: Stopping systemd-udevd.service... May 8 00:39:06.866663 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:39:06.868374 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:39:06.869434 systemd[1]: Stopped systemd-resolved.service. May 8 00:39:06.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.872622 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:39:06.873734 systemd[1]: Stopped systemd-udevd.service. May 8 00:39:06.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.875965 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:39:06.876045 systemd[1]: Stopped network-cleanup.service. May 8 00:39:06.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.877000 audit: BPF prog-id=6 op=UNLOAD May 8 00:39:06.878042 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:39:06.878078 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:39:06.879157 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:39:06.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.879191 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:39:06.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.879445 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:39:06.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.879475 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:39:06.882808 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:39:06.882868 systemd[1]: Stopped dracut-cmdline.service. May 8 00:39:06.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.883401 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:39:06.883441 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:39:06.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.887202 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:39:06.888940 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:39:06.889001 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:39:06.893442 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:39:06.893547 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:39:06.908066 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:39:06.908182 systemd[1]: Stopped sysroot-boot.service. May 8 00:39:06.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.909971 systemd[1]: Reached target initrd-switch-root.target. May 8 00:39:06.911560 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:39:06.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:06.911614 systemd[1]: Stopped initrd-setup-root.service. May 8 00:39:06.914284 systemd[1]: Starting initrd-switch-root.service... May 8 00:39:06.932227 systemd[1]: Switching root. May 8 00:39:06.949695 systemd-journald[198]: Journal stopped May 8 00:39:11.367255 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 8 00:39:11.367327 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:39:11.367346 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:39:11.367359 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:39:11.367373 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:39:11.367386 kernel: SELinux: policy capability open_perms=1 May 8 00:39:11.367410 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:39:11.367423 kernel: SELinux: policy capability always_check_network=0 May 8 00:39:11.367445 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:39:11.367459 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:39:11.367483 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:39:11.367500 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:39:11.367530 systemd[1]: Successfully loaded SELinux policy in 42.963ms. May 8 00:39:11.367553 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.157ms. May 8 00:39:11.367569 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:39:11.367584 systemd[1]: Detected virtualization kvm. May 8 00:39:11.367598 systemd[1]: Detected architecture x86-64. May 8 00:39:11.367613 systemd[1]: Detected first boot. May 8 00:39:11.367627 systemd[1]: Initializing machine ID from VM UUID. May 8 00:39:11.367642 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:39:11.367656 systemd[1]: Populated /etc with preset unit settings. May 8 00:39:11.367671 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:39:11.367691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:39:11.367706 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:39:11.367722 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:39:11.367738 systemd[1]: Stopped initrd-switch-root.service. May 8 00:39:11.367752 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:39:11.367767 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:39:11.367782 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:39:11.367808 systemd[1]: Created slice system-getty.slice. May 8 00:39:11.367826 systemd[1]: Created slice system-modprobe.slice. May 8 00:39:11.367847 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:39:11.367863 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:39:11.367878 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:39:11.367893 systemd[1]: Created slice user.slice. May 8 00:39:11.367908 systemd[1]: Started systemd-ask-password-console.path. May 8 00:39:11.367923 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:39:11.367937 systemd[1]: Set up automount boot.automount. May 8 00:39:11.367952 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:39:11.367967 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:39:11.367985 systemd[1]: Stopped target initrd-fs.target. May 8 00:39:11.368012 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:39:11.368028 systemd[1]: Reached target integritysetup.target. May 8 00:39:11.368043 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:39:11.368059 systemd[1]: Reached target remote-fs.target. May 8 00:39:11.368074 systemd[1]: Reached target slices.target. May 8 00:39:11.368089 systemd[1]: Reached target swap.target. May 8 00:39:11.368104 systemd[1]: Reached target torcx.target. May 8 00:39:11.368123 systemd[1]: Reached target veritysetup.target. May 8 00:39:11.368138 systemd[1]: Listening on systemd-coredump.socket. May 8 00:39:11.368164 systemd[1]: Listening on systemd-initctl.socket. May 8 00:39:11.368179 systemd[1]: Listening on systemd-networkd.socket. May 8 00:39:11.368195 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:39:11.368210 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:39:11.368225 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:39:11.368240 systemd[1]: Mounting dev-hugepages.mount... May 8 00:39:11.368256 systemd[1]: Mounting dev-mqueue.mount... May 8 00:39:11.368274 systemd[1]: Mounting media.mount... May 8 00:39:11.368290 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:11.368306 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:39:11.368321 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:39:11.368335 systemd[1]: Mounting tmp.mount... May 8 00:39:11.368349 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:39:11.368364 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:39:11.368378 systemd[1]: Starting kmod-static-nodes.service... May 8 00:39:11.368393 systemd[1]: Starting modprobe@configfs.service... May 8 00:39:11.368416 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:39:11.368430 systemd[1]: Starting modprobe@drm.service... May 8 00:39:11.368445 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:39:11.368462 systemd[1]: Starting modprobe@fuse.service... May 8 00:39:11.368477 systemd[1]: Starting modprobe@loop.service... May 8 00:39:11.368506 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:39:11.368539 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:39:11.368556 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:39:11.368571 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:39:11.368590 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:39:11.368607 systemd[1]: Stopped systemd-journald.service. May 8 00:39:11.368622 kernel: fuse: init (API version 7.34) May 8 00:39:11.368637 kernel: loop: module loaded May 8 00:39:11.368653 systemd[1]: Starting systemd-journald.service... May 8 00:39:11.368669 systemd[1]: Starting systemd-modules-load.service... May 8 00:39:11.368685 systemd[1]: Starting systemd-network-generator.service... May 8 00:39:11.368701 systemd[1]: Starting systemd-remount-fs.service... May 8 00:39:11.368717 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:39:11.368735 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:39:11.368763 systemd[1]: Stopped verity-setup.service. May 8 00:39:11.368779 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:11.368797 systemd-journald[989]: Journal started May 8 00:39:11.368850 systemd-journald[989]: Runtime Journal (/run/log/journal/f7ac5d70947144748f718c198cc2a0c8) is 6.0M, max 48.4M, 42.4M free. May 8 00:39:07.015000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:39:07.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:39:07.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:39:07.249000 audit: BPF prog-id=10 op=LOAD May 8 00:39:07.249000 audit: BPF prog-id=10 op=UNLOAD May 8 00:39:07.249000 audit: BPF prog-id=11 op=LOAD May 8 00:39:07.249000 audit: BPF prog-id=11 op=UNLOAD May 8 00:39:07.286000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:39:07.286000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a4 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:07.286000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:39:07.288000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:39:07.288000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:07.288000 audit: CWD cwd="/" May 8 00:39:07.288000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:07.288000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:07.288000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:39:11.222000 audit: BPF prog-id=12 op=LOAD May 8 00:39:11.222000 audit: BPF prog-id=3 op=UNLOAD May 8 00:39:11.222000 audit: BPF prog-id=13 op=LOAD May 8 00:39:11.222000 audit: BPF prog-id=14 op=LOAD May 8 00:39:11.223000 audit: BPF prog-id=4 op=UNLOAD May 8 00:39:11.223000 audit: BPF prog-id=5 op=UNLOAD May 8 00:39:11.224000 audit: BPF prog-id=15 op=LOAD May 8 00:39:11.224000 audit: BPF prog-id=12 op=UNLOAD May 8 00:39:11.224000 audit: BPF prog-id=16 op=LOAD May 8 00:39:11.224000 audit: BPF prog-id=17 op=LOAD May 8 00:39:11.224000 audit: BPF prog-id=13 op=UNLOAD May 8 00:39:11.224000 audit: BPF prog-id=14 op=UNLOAD May 8 00:39:11.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.241000 audit: BPF prog-id=15 op=UNLOAD May 8 00:39:11.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.344000 audit: BPF prog-id=18 op=LOAD May 8 00:39:11.344000 audit: BPF prog-id=19 op=LOAD May 8 00:39:11.344000 audit: BPF prog-id=20 op=LOAD May 8 00:39:11.344000 audit: BPF prog-id=16 op=UNLOAD May 8 00:39:11.344000 audit: BPF prog-id=17 op=UNLOAD May 8 00:39:11.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.365000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:39:11.365000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc2985b8c0 a2=4000 a3=7ffc2985b95c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.365000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:39:11.221535 systemd[1]: Queued start job for default target multi-user.target. May 8 00:39:07.285034 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:39:11.370646 systemd[1]: Started systemd-journald.service. May 8 00:39:11.221547 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:39:07.285319 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:39:11.225335 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:39:07.285338 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:39:07.285371 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:39:07.285381 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:39:07.285412 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:39:11.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:07.285425 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:39:11.371684 systemd[1]: Mounted dev-hugepages.mount. May 8 00:39:07.285655 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:39:07.285696 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:39:07.285709 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:39:07.286401 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:39:07.286435 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:39:07.286452 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:39:07.286466 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:39:07.286482 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:39:07.286494 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:39:10.907197 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:39:10.907457 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:39:10.907613 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:39:11.373023 systemd[1]: Mounted dev-mqueue.mount. May 8 00:39:10.907789 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:39:10.907839 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:39:10.907922 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-08T00:39:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:39:11.373952 systemd[1]: Mounted media.mount. May 8 00:39:11.374800 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:39:11.375768 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:39:11.376680 systemd[1]: Mounted tmp.mount. May 8 00:39:11.377640 systemd[1]: Finished kmod-static-nodes.service. May 8 00:39:11.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.378773 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:39:11.378965 systemd[1]: Finished modprobe@configfs.service. May 8 00:39:11.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.380081 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:39:11.380239 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:39:11.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.381346 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:39:11.381608 systemd[1]: Finished modprobe@drm.service. May 8 00:39:11.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.382703 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:39:11.382882 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:39:11.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.384140 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:39:11.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.385200 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:39:11.385349 systemd[1]: Finished modprobe@fuse.service. May 8 00:39:11.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.386377 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:39:11.386547 systemd[1]: Finished modprobe@loop.service. May 8 00:39:11.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.387783 systemd[1]: Finished systemd-modules-load.service. May 8 00:39:11.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.388984 systemd[1]: Finished systemd-network-generator.service. May 8 00:39:11.390459 systemd[1]: Finished systemd-remount-fs.service. May 8 00:39:11.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.391936 systemd[1]: Reached target network-pre.target. May 8 00:39:11.394196 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:39:11.396498 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:39:11.397320 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:39:11.399066 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:39:11.401141 systemd[1]: Starting systemd-journal-flush.service... May 8 00:39:11.402240 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:39:11.403591 systemd[1]: Starting systemd-random-seed.service... May 8 00:39:11.404547 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:39:11.405901 systemd[1]: Starting systemd-sysctl.service... May 8 00:39:11.408025 systemd[1]: Starting systemd-sysusers.service... May 8 00:39:11.412284 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:39:11.413400 systemd-journald[989]: Time spent on flushing to /var/log/journal/f7ac5d70947144748f718c198cc2a0c8 is 17.146ms for 1162 entries. May 8 00:39:11.413400 systemd-journald[989]: System Journal (/var/log/journal/f7ac5d70947144748f718c198cc2a0c8) is 8.0M, max 195.6M, 187.6M free. May 8 00:39:11.445543 systemd-journald[989]: Received client request to flush runtime journal. May 8 00:39:11.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.414681 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:39:11.419809 systemd[1]: Finished systemd-random-seed.service. May 8 00:39:11.446164 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:39:11.421054 systemd[1]: Reached target first-boot-complete.target. May 8 00:39:11.425913 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:39:11.428072 systemd[1]: Starting systemd-udev-settle.service... May 8 00:39:11.429182 systemd[1]: Finished systemd-sysusers.service. May 8 00:39:11.432527 systemd[1]: Finished systemd-sysctl.service. May 8 00:39:11.446488 systemd[1]: Finished systemd-journal-flush.service. May 8 00:39:11.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.858869 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:39:11.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.860764 kernel: kauditd_printk_skb: 99 callbacks suppressed May 8 00:39:11.860830 kernel: audit: type=1130 audit(1746664751.859:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.863000 audit: BPF prog-id=21 op=LOAD May 8 00:39:11.865238 kernel: audit: type=1334 audit(1746664751.863:135): prog-id=21 op=LOAD May 8 00:39:11.865288 kernel: audit: type=1334 audit(1746664751.864:136): prog-id=22 op=LOAD May 8 00:39:11.864000 audit: BPF prog-id=22 op=LOAD May 8 00:39:11.865931 systemd[1]: Starting systemd-udevd.service... May 8 00:39:11.864000 audit: BPF prog-id=7 op=UNLOAD May 8 00:39:11.864000 audit: BPF prog-id=8 op=UNLOAD May 8 00:39:11.866529 kernel: audit: type=1334 audit(1746664751.864:137): prog-id=7 op=UNLOAD May 8 00:39:11.866557 kernel: audit: type=1334 audit(1746664751.864:138): prog-id=8 op=UNLOAD May 8 00:39:11.887327 systemd-udevd[1015]: Using default interface naming scheme 'v252'. May 8 00:39:11.900361 systemd[1]: Started systemd-udevd.service. May 8 00:39:11.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.907333 kernel: audit: type=1130 audit(1746664751.900:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.907460 kernel: audit: type=1334 audit(1746664751.904:140): prog-id=23 op=LOAD May 8 00:39:11.904000 audit: BPF prog-id=23 op=LOAD May 8 00:39:11.905468 systemd[1]: Starting systemd-networkd.service... May 8 00:39:11.910000 audit: BPF prog-id=24 op=LOAD May 8 00:39:11.911000 audit: BPF prog-id=25 op=LOAD May 8 00:39:11.913583 kernel: audit: type=1334 audit(1746664751.910:141): prog-id=24 op=LOAD May 8 00:39:11.913635 kernel: audit: type=1334 audit(1746664751.911:142): prog-id=25 op=LOAD May 8 00:39:11.913653 kernel: audit: type=1334 audit(1746664751.913:143): prog-id=26 op=LOAD May 8 00:39:11.913000 audit: BPF prog-id=26 op=LOAD May 8 00:39:11.914290 systemd[1]: Starting systemd-userdbd.service... May 8 00:39:11.938688 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 8 00:39:11.946928 systemd[1]: Started systemd-userdbd.service. May 8 00:39:11.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:11.971758 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:39:11.978549 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 8 00:39:11.987533 kernel: ACPI: button: Power Button [PWRF] May 8 00:39:11.993000 audit[1035]: AVC avc: denied { confidentiality } for pid=1035 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 8 00:39:12.004326 systemd-networkd[1025]: lo: Link UP May 8 00:39:12.004772 systemd-networkd[1025]: lo: Gained carrier May 8 00:39:12.005310 systemd-networkd[1025]: Enumeration completed May 8 00:39:12.005420 systemd[1]: Started systemd-networkd.service. May 8 00:39:12.006099 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:39:12.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.007854 systemd-networkd[1025]: eth0: Link UP May 8 00:39:12.007986 systemd-networkd[1025]: eth0: Gained carrier May 8 00:39:12.033655 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.23/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:39:11.993000 audit[1035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56469f1aaf90 a1=338ac a2=7ff081ebbbc5 a3=5 items=110 ppid=1015 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.993000 audit: CWD cwd="/" May 8 00:39:11.993000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=1 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=2 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=3 name=(null) inode=15248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=4 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=5 name=(null) inode=15249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=6 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=7 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=8 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=9 name=(null) inode=15251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=10 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=11 name=(null) inode=15252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=12 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=13 name=(null) inode=15253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=14 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=15 name=(null) inode=15254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=16 name=(null) inode=15250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=17 name=(null) inode=15255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=18 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=19 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=20 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=21 name=(null) inode=15257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=22 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=23 name=(null) inode=15258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=24 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=25 name=(null) inode=15259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=26 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=27 name=(null) inode=15260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=28 name=(null) inode=15256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=29 name=(null) inode=15261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=30 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=31 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=32 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=33 name=(null) inode=15263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=34 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=35 name=(null) inode=15264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=36 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=37 name=(null) inode=15265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=38 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=39 name=(null) inode=15266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=40 name=(null) inode=15262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=41 name=(null) inode=15267 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=42 name=(null) inode=15247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=43 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=44 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=45 name=(null) inode=15269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=46 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=47 name=(null) inode=15270 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=48 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=49 name=(null) inode=15271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=50 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=51 name=(null) inode=15272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=52 name=(null) inode=15268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=53 name=(null) inode=15273 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=55 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=56 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=57 name=(null) inode=15275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=58 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=59 name=(null) inode=15276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=60 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=61 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=62 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=63 name=(null) inode=15278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=64 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=65 name=(null) inode=15279 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=66 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=67 name=(null) inode=15280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=68 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=69 name=(null) inode=15281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=70 name=(null) inode=15277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=71 name=(null) inode=15282 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=72 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=73 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=74 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=75 name=(null) inode=15284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=76 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=77 name=(null) inode=15285 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=78 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=79 name=(null) inode=15286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=80 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=81 name=(null) inode=15287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=82 name=(null) inode=15283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=83 name=(null) inode=15288 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=84 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=85 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=86 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=87 name=(null) inode=15290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=88 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=89 name=(null) inode=15291 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=90 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=91 name=(null) inode=15292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=92 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=93 name=(null) inode=15293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=94 name=(null) inode=15289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=95 name=(null) inode=15294 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=96 name=(null) inode=15274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=97 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=98 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=99 name=(null) inode=15296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=100 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=101 name=(null) inode=15297 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=102 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=103 name=(null) inode=15298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=104 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=105 name=(null) inode=15299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=106 name=(null) inode=15295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=107 name=(null) inode=15300 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PATH item=109 name=(null) inode=13771 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:11.993000 audit: PROCTITLE proctitle="(udev-worker)" May 8 00:39:12.049532 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 8 00:39:12.054651 kernel: mousedev: PS/2 mouse device common for all mice May 8 00:39:12.077110 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 8 00:39:12.080139 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 8 00:39:12.080364 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 8 00:39:12.080602 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 8 00:39:12.100626 kernel: kvm: Nested Virtualization enabled May 8 00:39:12.100733 kernel: SVM: kvm: Nested Paging enabled May 8 00:39:12.100748 kernel: SVM: Virtual VMLOAD VMSAVE supported May 8 00:39:12.100760 kernel: SVM: Virtual GIF supported May 8 00:39:12.117563 kernel: EDAC MC: Ver: 3.0.0 May 8 00:39:12.140911 systemd[1]: Finished systemd-udev-settle.service. May 8 00:39:12.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.143692 systemd[1]: Starting lvm2-activation-early.service... May 8 00:39:12.151151 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:39:12.180777 systemd[1]: Finished lvm2-activation-early.service. May 8 00:39:12.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.182071 systemd[1]: Reached target cryptsetup.target. May 8 00:39:12.184627 systemd[1]: Starting lvm2-activation.service... May 8 00:39:12.188871 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:39:12.218629 systemd[1]: Finished lvm2-activation.service. May 8 00:39:12.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.219801 systemd[1]: Reached target local-fs-pre.target. May 8 00:39:12.220755 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:39:12.220790 systemd[1]: Reached target local-fs.target. May 8 00:39:12.221675 systemd[1]: Reached target machines.target. May 8 00:39:12.224063 systemd[1]: Starting ldconfig.service... May 8 00:39:12.225272 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:39:12.225340 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:12.226685 systemd[1]: Starting systemd-boot-update.service... May 8 00:39:12.228896 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:39:12.231470 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:39:12.233935 systemd[1]: Starting systemd-sysext.service... May 8 00:39:12.234787 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) May 8 00:39:12.235825 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:39:12.241068 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:39:12.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.244071 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:39:12.247730 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:39:12.248045 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:39:12.278937 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) May 8 00:39:12.278937 systemd-fsck[1063]: /dev/vda1: 791 files, 120730/258078 clusters May 8 00:39:12.280598 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:39:12.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.284010 systemd[1]: Mounting boot.mount... May 8 00:39:12.295179 systemd[1]: Mounted boot.mount. May 8 00:39:12.296853 kernel: loop0: detected capacity change from 0 to 218376 May 8 00:39:12.498750 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:39:12.499472 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:39:12.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.502536 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:39:12.504181 systemd[1]: Finished systemd-boot-update.service. May 8 00:39:12.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.525640 kernel: loop1: detected capacity change from 0 to 218376 May 8 00:39:12.529692 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 8 00:39:12.530079 (sd-sysext)[1069]: Merged extensions into '/usr'. May 8 00:39:12.547401 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.549095 systemd[1]: Mounting usr-share-oem.mount... May 8 00:39:12.550075 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:39:12.551239 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:39:12.553393 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:39:12.555313 systemd[1]: Starting modprobe@loop.service... May 8 00:39:12.556187 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:39:12.556298 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:12.556391 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.558928 systemd[1]: Mounted usr-share-oem.mount. May 8 00:39:12.560147 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:39:12.560278 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:39:12.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.561408 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:39:12.561577 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:39:12.561686 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:39:12.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.562977 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:39:12.563086 systemd[1]: Finished modprobe@loop.service. May 8 00:39:12.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.564366 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:39:12.564469 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:39:12.565497 systemd[1]: Finished systemd-sysext.service. May 8 00:39:12.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.567982 systemd[1]: Starting ensure-sysext.service... May 8 00:39:12.569717 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:39:12.571008 systemd[1]: Finished ldconfig.service. May 8 00:39:12.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.576175 systemd[1]: Reloading. May 8 00:39:12.586318 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:39:12.588393 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:39:12.591206 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:39:12.630206 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:39:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:39:12.630648 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:39:12Z" level=info msg="torcx already run" May 8 00:39:12.709364 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:39:12.709386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:39:12.727931 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:39:12.788000 audit: BPF prog-id=27 op=LOAD May 8 00:39:12.788000 audit: BPF prog-id=24 op=UNLOAD May 8 00:39:12.789000 audit: BPF prog-id=28 op=LOAD May 8 00:39:12.789000 audit: BPF prog-id=29 op=LOAD May 8 00:39:12.789000 audit: BPF prog-id=25 op=UNLOAD May 8 00:39:12.789000 audit: BPF prog-id=26 op=UNLOAD May 8 00:39:12.791000 audit: BPF prog-id=30 op=LOAD May 8 00:39:12.791000 audit: BPF prog-id=18 op=UNLOAD May 8 00:39:12.791000 audit: BPF prog-id=31 op=LOAD May 8 00:39:12.791000 audit: BPF prog-id=32 op=LOAD May 8 00:39:12.791000 audit: BPF prog-id=19 op=UNLOAD May 8 00:39:12.791000 audit: BPF prog-id=20 op=UNLOAD May 8 00:39:12.792000 audit: BPF prog-id=33 op=LOAD May 8 00:39:12.792000 audit: BPF prog-id=23 op=UNLOAD May 8 00:39:12.792000 audit: BPF prog-id=34 op=LOAD May 8 00:39:12.792000 audit: BPF prog-id=35 op=LOAD May 8 00:39:12.792000 audit: BPF prog-id=21 op=UNLOAD May 8 00:39:12.792000 audit: BPF prog-id=22 op=UNLOAD May 8 00:39:12.796913 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:39:12.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.802502 systemd[1]: Starting audit-rules.service... May 8 00:39:12.804713 systemd[1]: Starting clean-ca-certificates.service... May 8 00:39:12.807025 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:39:12.808000 audit: BPF prog-id=36 op=LOAD May 8 00:39:12.809973 systemd[1]: Starting systemd-resolved.service... May 8 00:39:12.811000 audit: BPF prog-id=37 op=LOAD May 8 00:39:12.812535 systemd[1]: Starting systemd-timesyncd.service... May 8 00:39:12.814686 systemd[1]: Starting systemd-update-utmp.service... May 8 00:39:12.820000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:39:12.824155 systemd[1]: Finished clean-ca-certificates.service. May 8 00:39:12.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.825632 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.825870 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:39:12.827489 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:39:12.829861 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:39:12.833020 systemd[1]: Starting modprobe@loop.service... May 8 00:39:12.833911 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:39:12.834072 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:12.834205 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:39:12.834313 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.835575 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:39:12.835698 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:39:12.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.837135 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:39:12.837240 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:39:12.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.838729 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:39:12.838830 systemd[1]: Finished modprobe@loop.service. May 8 00:39:12.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.840314 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:39:12.840446 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:39:12.842112 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:39:12.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.843682 systemd[1]: Finished systemd-update-utmp.service. May 8 00:39:12.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.846735 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.846916 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:39:12.848660 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:39:12.850754 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:39:12.852949 systemd[1]: Starting modprobe@loop.service... May 8 00:39:12.853833 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:39:12.853940 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:12.855322 systemd[1]: Starting systemd-update-done.service... May 8 00:39:12.856259 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:39:12.856369 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.857358 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:39:12.857489 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:39:12.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.858847 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:39:12.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.858981 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:39:12.860321 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:39:12.860430 systemd[1]: Finished modprobe@loop.service. May 8 00:39:12.861725 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:39:12.861812 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:39:12.864397 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:12.864650 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:39:12.866571 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:39:12.869000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:39:12.869000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff5d68910 a2=420 a3=0 items=0 ppid=1138 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.869000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:39:12.870184 augenrules[1166]: No rules May 8 00:39:12.870429 systemd[1]: Starting modprobe@drm.service... May 8 00:39:12.872532 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:39:12.874680 systemd[1]: Starting modprobe@loop.service... May 8 00:39:12.876139 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:39:12.876316 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:12.877713 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:39:13.327998 systemd-timesyncd[1146]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:39:13.328049 systemd-timesyncd[1146]: Initial clock synchronization to Thu 2025-05-08 00:39:13.327926 UTC. May 8 00:39:13.328522 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:39:13.328659 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:39:13.329693 systemd[1]: Started systemd-timesyncd.service. May 8 00:39:13.331328 systemd[1]: Finished audit-rules.service. May 8 00:39:13.332674 systemd[1]: Finished systemd-update-done.service. May 8 00:39:13.334001 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:39:13.334176 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:39:13.334601 systemd-resolved[1142]: Positive Trust Anchors: May 8 00:39:13.334609 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:39:13.334857 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:39:13.335533 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:39:13.335640 systemd[1]: Finished modprobe@drm.service. May 8 00:39:13.337018 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:39:13.337154 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:39:13.338600 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:39:13.338725 systemd[1]: Finished modprobe@loop.service. May 8 00:39:13.340474 systemd[1]: Reached target time-set.target. May 8 00:39:13.341550 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:39:13.341586 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:39:13.342921 systemd[1]: Finished ensure-sysext.service. May 8 00:39:13.344752 systemd-resolved[1142]: Defaulting to hostname 'linux'. May 8 00:39:13.346601 systemd[1]: Started systemd-resolved.service. May 8 00:39:13.347618 systemd[1]: Reached target network.target. May 8 00:39:13.348521 systemd[1]: Reached target nss-lookup.target. May 8 00:39:13.349517 systemd[1]: Reached target sysinit.target. May 8 00:39:13.350555 systemd[1]: Started motdgen.path. May 8 00:39:13.351402 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:39:13.352825 systemd[1]: Started logrotate.timer. May 8 00:39:13.353757 systemd[1]: Started mdadm.timer. May 8 00:39:13.354547 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:39:13.355508 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:39:13.355526 systemd[1]: Reached target paths.target. May 8 00:39:13.356435 systemd[1]: Reached target timers.target. May 8 00:39:13.357688 systemd[1]: Listening on dbus.socket. May 8 00:39:13.359560 systemd[1]: Starting docker.socket... May 8 00:39:13.362816 systemd[1]: Listening on sshd.socket. May 8 00:39:13.363786 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:13.364177 systemd[1]: Listening on docker.socket. May 8 00:39:13.365097 systemd[1]: Reached target sockets.target. May 8 00:39:13.365911 systemd[1]: Reached target basic.target. May 8 00:39:13.366731 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:39:13.366755 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:39:13.367642 systemd[1]: Starting containerd.service... May 8 00:39:13.369402 systemd[1]: Starting dbus.service... May 8 00:39:13.371160 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:39:13.373504 systemd[1]: Starting extend-filesystems.service... May 8 00:39:13.374596 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:39:13.376056 systemd[1]: Starting motdgen.service... May 8 00:39:13.378429 systemd[1]: Starting prepare-helm.service... May 8 00:39:13.397159 jq[1180]: false May 8 00:39:13.388874 dbus-daemon[1179]: [system] SELinux support is enabled May 8 00:39:13.380742 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:39:13.383452 systemd[1]: Starting sshd-keygen.service... May 8 00:39:13.386536 systemd[1]: Starting systemd-logind.service... May 8 00:39:13.387515 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:39:13.387591 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:39:13.387964 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:39:13.406232 jq[1192]: true May 8 00:39:13.388826 systemd[1]: Starting update-engine.service... May 8 00:39:13.390652 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:39:13.392287 systemd[1]: Started dbus.service. May 8 00:39:13.395714 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:39:13.395881 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:39:13.396972 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:39:13.397169 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:39:13.400000 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:39:13.400042 systemd[1]: Reached target system-config.target. May 8 00:39:13.401278 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:39:13.401294 systemd[1]: Reached target user-config.target. May 8 00:39:13.410226 jq[1198]: true May 8 00:39:13.410492 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:39:13.410679 systemd[1]: Finished motdgen.service. May 8 00:39:13.411788 extend-filesystems[1181]: Found loop1 May 8 00:39:13.414703 extend-filesystems[1181]: Found sr0 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda May 8 00:39:13.414703 extend-filesystems[1181]: Found vda1 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda2 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda3 May 8 00:39:13.414703 extend-filesystems[1181]: Found usr May 8 00:39:13.414703 extend-filesystems[1181]: Found vda4 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda6 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda7 May 8 00:39:13.414703 extend-filesystems[1181]: Found vda9 May 8 00:39:13.414703 extend-filesystems[1181]: Checking size of /dev/vda9 May 8 00:39:13.448651 extend-filesystems[1181]: Resized partition /dev/vda9 May 8 00:39:13.447084 systemd[1]: Started update-engine.service. May 8 00:39:13.451997 update_engine[1190]: I0508 00:39:13.443926 1190 main.cc:92] Flatcar Update Engine starting May 8 00:39:13.451997 update_engine[1190]: I0508 00:39:13.446444 1190 update_check_scheduler.cc:74] Next update check in 10m31s May 8 00:39:13.455474 tar[1197]: linux-amd64/LICENSE May 8 00:39:13.455474 tar[1197]: linux-amd64/helm May 8 00:39:13.450580 systemd[1]: Started locksmithd.service. May 8 00:39:13.470089 env[1200]: time="2025-05-08T00:39:13.469991653Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:39:13.490883 env[1200]: time="2025-05-08T00:39:13.490793652Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:39:13.490959 env[1200]: time="2025-05-08T00:39:13.490923796Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.492253 env[1200]: time="2025-05-08T00:39:13.492209017Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:39:13.492253 env[1200]: time="2025-05-08T00:39:13.492244854Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.492474 env[1200]: time="2025-05-08T00:39:13.492436864Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:39:13.492474 env[1200]: time="2025-05-08T00:39:13.492470737Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.492540 env[1200]: time="2025-05-08T00:39:13.492488451Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:39:13.492540 env[1200]: time="2025-05-08T00:39:13.492501736Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.492601 env[1200]: time="2025-05-08T00:39:13.492580954Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.492921 env[1200]: time="2025-05-08T00:39:13.492892649Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:39:13.493113 env[1200]: time="2025-05-08T00:39:13.493079129Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:39:13.493113 env[1200]: time="2025-05-08T00:39:13.493104917Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:39:13.493186 env[1200]: time="2025-05-08T00:39:13.493164669Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:39:13.493186 env[1200]: time="2025-05-08T00:39:13.493179677Z" level=info msg="metadata content store policy set" policy=shared May 8 00:39:13.516449 systemd-logind[1189]: Watching system buttons on /dev/input/event1 (Power Button) May 8 00:39:13.516484 systemd-logind[1189]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 8 00:39:13.517736 systemd-logind[1189]: New seat seat0. May 8 00:39:13.518450 extend-filesystems[1225]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:39:13.521097 systemd[1]: Started systemd-logind.service. May 8 00:39:13.602713 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:39:13.607046 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:39:13.933056 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:39:13.971423 extend-filesystems[1225]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:39:13.971423 extend-filesystems[1225]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:39:13.971423 extend-filesystems[1225]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:39:13.976192 extend-filesystems[1181]: Resized filesystem in /dev/vda9 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975707271Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975789385Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975804483Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975870648Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975898179Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975915331Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975929959Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975958362Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975974983Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.975991224Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.976014327Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.976053480Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.976206978Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:39:13.977261 env[1200]: time="2025-05-08T00:39:13.976292168Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:39:13.977673 bash[1230]: Updated "/home/core/.ssh/authorized_keys" May 8 00:39:13.977269 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976628609Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976659537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976674916Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976745058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976757691Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976768802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976781646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976795282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976805792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976816111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976826320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976837952Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976943179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976959390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978164 env[1200]: time="2025-05-08T00:39:13.976971793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:39:13.977546 systemd[1]: Finished extend-filesystems.service. May 8 00:39:13.978652 env[1200]: time="2025-05-08T00:39:13.976981992Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:39:13.978652 env[1200]: time="2025-05-08T00:39:13.976995117Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:39:13.978652 env[1200]: time="2025-05-08T00:39:13.977005967Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:39:13.978652 env[1200]: time="2025-05-08T00:39:13.977057804Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:39:13.978652 env[1200]: time="2025-05-08T00:39:13.977100154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.977385108Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.977438438Z" level=info msg="Connect containerd service" May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.977509882Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.978140605Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.978400653Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.978431260Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:39:13.978808 env[1200]: time="2025-05-08T00:39:13.978490181Z" level=info msg="containerd successfully booted in 0.509280s" May 8 00:39:13.978961 systemd[1]: Started containerd.service. May 8 00:39:13.980277 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981151964Z" level=info msg="Start subscribing containerd event" May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981250669Z" level=info msg="Start recovering state" May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981350927Z" level=info msg="Start event monitor" May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981380683Z" level=info msg="Start snapshots syncer" May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981396663Z" level=info msg="Start cni network conf syncer for default" May 8 00:39:13.983387 env[1200]: time="2025-05-08T00:39:13.981408315Z" level=info msg="Start streaming server" May 8 00:39:14.088232 tar[1197]: linux-amd64/README.md May 8 00:39:14.093356 systemd[1]: Finished prepare-helm.service. May 8 00:39:14.108851 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:39:14.129740 systemd[1]: Finished sshd-keygen.service. May 8 00:39:14.131914 systemd[1]: Starting issuegen.service... May 8 00:39:14.137193 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:39:14.137317 systemd[1]: Finished issuegen.service. May 8 00:39:14.139284 systemd[1]: Starting systemd-user-sessions.service... May 8 00:39:14.144541 systemd[1]: Finished systemd-user-sessions.service. May 8 00:39:14.146626 systemd[1]: Started getty@tty1.service. May 8 00:39:14.148583 systemd[1]: Started serial-getty@ttyS0.service. May 8 00:39:14.149734 systemd[1]: Reached target getty.target. May 8 00:39:14.195220 systemd-networkd[1025]: eth0: Gained IPv6LL May 8 00:39:14.197052 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:39:14.198528 systemd[1]: Reached target network-online.target. May 8 00:39:14.200673 systemd[1]: Starting kubelet.service... May 8 00:39:14.871863 systemd[1]: Started kubelet.service. May 8 00:39:14.873167 systemd[1]: Reached target multi-user.target. May 8 00:39:14.875268 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:39:14.884826 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:39:14.884993 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:39:14.886407 systemd[1]: Startup finished in 898ms (kernel) + 5.045s (initrd) + 7.465s (userspace) = 13.409s. May 8 00:39:15.280137 kubelet[1261]: E0508 00:39:15.279984 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:39:15.282708 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:39:15.282872 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:39:15.993008 systemd[1]: Created slice system-sshd.slice. May 8 00:39:15.994291 systemd[1]: Started sshd@0-10.0.0.23:22-10.0.0.1:57674.service. May 8 00:39:16.195164 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 57674 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.196942 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.207283 systemd-logind[1189]: New session 1 of user core. May 8 00:39:16.208309 systemd[1]: Created slice user-500.slice. May 8 00:39:16.209595 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:39:16.218747 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:39:16.219998 systemd[1]: Starting user@500.service... May 8 00:39:16.223207 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.295638 systemd[1274]: Queued start job for default target default.target. May 8 00:39:16.296243 systemd[1274]: Reached target paths.target. May 8 00:39:16.296268 systemd[1274]: Reached target sockets.target. May 8 00:39:16.296285 systemd[1274]: Reached target timers.target. May 8 00:39:16.296300 systemd[1274]: Reached target basic.target. May 8 00:39:16.296350 systemd[1274]: Reached target default.target. May 8 00:39:16.296392 systemd[1274]: Startup finished in 67ms. May 8 00:39:16.296606 systemd[1]: Started user@500.service. May 8 00:39:16.297919 systemd[1]: Started session-1.scope. May 8 00:39:16.349663 systemd[1]: Started sshd@1-10.0.0.23:22-10.0.0.1:57680.service. May 8 00:39:16.394121 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 57680 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.396254 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.400549 systemd-logind[1189]: New session 2 of user core. May 8 00:39:16.401745 systemd[1]: Started session-2.scope. May 8 00:39:16.456483 sshd[1283]: pam_unix(sshd:session): session closed for user core May 8 00:39:16.460502 systemd[1]: sshd@1-10.0.0.23:22-10.0.0.1:57680.service: Deactivated successfully. May 8 00:39:16.461252 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:39:16.461897 systemd-logind[1189]: Session 2 logged out. Waiting for processes to exit. May 8 00:39:16.463520 systemd[1]: Started sshd@2-10.0.0.23:22-10.0.0.1:57696.service. May 8 00:39:16.464352 systemd-logind[1189]: Removed session 2. May 8 00:39:16.500648 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 57696 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.501870 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.505864 systemd-logind[1189]: New session 3 of user core. May 8 00:39:16.506909 systemd[1]: Started session-3.scope. May 8 00:39:16.560216 sshd[1289]: pam_unix(sshd:session): session closed for user core May 8 00:39:16.563889 systemd[1]: sshd@2-10.0.0.23:22-10.0.0.1:57696.service: Deactivated successfully. May 8 00:39:16.564617 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:39:16.565256 systemd-logind[1189]: Session 3 logged out. Waiting for processes to exit. May 8 00:39:16.566781 systemd[1]: Started sshd@3-10.0.0.23:22-10.0.0.1:57708.service. May 8 00:39:16.567633 systemd-logind[1189]: Removed session 3. May 8 00:39:16.605204 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 57708 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.606349 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.610466 systemd-logind[1189]: New session 4 of user core. May 8 00:39:16.611427 systemd[1]: Started session-4.scope. May 8 00:39:16.666918 sshd[1295]: pam_unix(sshd:session): session closed for user core May 8 00:39:16.669312 systemd[1]: sshd@3-10.0.0.23:22-10.0.0.1:57708.service: Deactivated successfully. May 8 00:39:16.669787 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:39:16.670299 systemd-logind[1189]: Session 4 logged out. Waiting for processes to exit. May 8 00:39:16.671253 systemd[1]: Started sshd@4-10.0.0.23:22-10.0.0.1:57712.service. May 8 00:39:16.671945 systemd-logind[1189]: Removed session 4. May 8 00:39:16.711123 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 57712 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.712528 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.716338 systemd-logind[1189]: New session 5 of user core. May 8 00:39:16.717454 systemd[1]: Started session-5.scope. May 8 00:39:16.774346 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:39:16.774542 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:39:16.783242 dbus-daemon[1179]: \xd0\u000d]\xa2\x87U: received setenforce notice (enforcing=1711200512) May 8 00:39:16.785588 sudo[1304]: pam_unix(sudo:session): session closed for user root May 8 00:39:16.787108 sshd[1301]: pam_unix(sshd:session): session closed for user core May 8 00:39:16.790182 systemd[1]: sshd@4-10.0.0.23:22-10.0.0.1:57712.service: Deactivated successfully. May 8 00:39:16.790799 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:39:16.791345 systemd-logind[1189]: Session 5 logged out. Waiting for processes to exit. May 8 00:39:16.792521 systemd[1]: Started sshd@5-10.0.0.23:22-10.0.0.1:57722.service. May 8 00:39:16.793252 systemd-logind[1189]: Removed session 5. May 8 00:39:16.831054 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 57722 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.832353 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.835929 systemd-logind[1189]: New session 6 of user core. May 8 00:39:16.836932 systemd[1]: Started session-6.scope. May 8 00:39:16.890538 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:39:16.890778 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:39:16.893506 sudo[1312]: pam_unix(sudo:session): session closed for user root May 8 00:39:16.897590 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:39:16.897839 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:39:16.905458 systemd[1]: Stopping audit-rules.service... May 8 00:39:16.905000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:39:16.905000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffec2aa43c0 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:16.905000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:39:16.906745 auditctl[1315]: No rules May 8 00:39:16.906956 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:39:16.907138 systemd[1]: Stopped audit-rules.service. May 8 00:39:16.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:16.908650 systemd[1]: Starting audit-rules.service... May 8 00:39:16.924410 augenrules[1332]: No rules May 8 00:39:16.924999 systemd[1]: Finished audit-rules.service. May 8 00:39:16.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:16.925843 sudo[1311]: pam_unix(sudo:session): session closed for user root May 8 00:39:16.924000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:39:16.924000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:39:16.927246 sshd[1308]: pam_unix(sshd:session): session closed for user core May 8 00:39:16.927000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:16.927000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:16.929943 systemd[1]: sshd@5-10.0.0.23:22-10.0.0.1:57722.service: Deactivated successfully. May 8 00:39:16.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.23:22-10.0.0.1:57722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:16.930529 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:39:16.931003 systemd-logind[1189]: Session 6 logged out. Waiting for processes to exit. May 8 00:39:16.932182 systemd[1]: Started sshd@6-10.0.0.23:22-10.0.0.1:57730.service. May 8 00:39:16.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.23:22-10.0.0.1:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:16.933314 systemd-logind[1189]: Removed session 6. May 8 00:39:16.969000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:16.970780 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 57730 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:39:16.971000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:16.971000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6b23a70 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:16.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:16.973524 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:16.978835 systemd-logind[1189]: New session 7 of user core. May 8 00:39:16.979774 systemd[1]: Started session-7.scope. May 8 00:39:16.983000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:16.985000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.034000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:39:17.034000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:39:17.035380 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:39:17.035608 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:39:17.036000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:39:17.113745 systemd[1]: Starting docker.service... May 8 00:39:17.177677 env[1353]: time="2025-05-08T00:39:17.177596099Z" level=info msg="Starting up" May 8 00:39:17.180065 env[1353]: time="2025-05-08T00:39:17.180000750Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:39:17.180065 env[1353]: time="2025-05-08T00:39:17.180043901Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:39:17.180065 env[1353]: time="2025-05-08T00:39:17.180065972Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:39:17.180065 env[1353]: time="2025-05-08T00:39:17.180076021Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:39:17.182375 env[1353]: time="2025-05-08T00:39:17.182328045Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:39:17.182375 env[1353]: time="2025-05-08T00:39:17.182355577Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:39:17.182520 env[1353]: time="2025-05-08T00:39:17.182389470Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:39:17.182520 env[1353]: time="2025-05-08T00:39:17.182425458Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:39:18.248100 env[1353]: time="2025-05-08T00:39:18.248037101Z" level=info msg="Loading containers: start." May 8 00:39:18.302000 audit[1387]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.304833 kernel: kauditd_printk_skb: 192 callbacks suppressed May 8 00:39:18.304984 kernel: audit: type=1325 audit(1746664758.302:217): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.302000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdc9fe1f80 a2=0 a3=7ffdc9fe1f6c items=0 ppid=1353 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.313886 kernel: audit: type=1300 audit(1746664758.302:217): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdc9fe1f80 a2=0 a3=7ffdc9fe1f6c items=0 ppid=1353 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.313991 kernel: audit: type=1327 audit(1746664758.302:217): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:39:18.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:39:18.303000 audit[1389]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.319394 kernel: audit: type=1325 audit(1746664758.303:218): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.319445 kernel: audit: type=1300 audit(1746664758.303:218): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff01098f90 a2=0 a3=7fff01098f7c items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.303000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff01098f90 a2=0 a3=7fff01098f7c items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.324535 kernel: audit: type=1327 audit(1746664758.303:218): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:39:18.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:39:18.306000 audit[1391]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.329276 kernel: audit: type=1325 audit(1746664758.306:219): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.329309 kernel: audit: type=1300 audit(1746664758.306:219): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefa27f190 a2=0 a3=7ffefa27f17c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.306000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefa27f190 a2=0 a3=7ffefa27f17c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.334532 kernel: audit: type=1327 audit(1746664758.306:219): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:39:18.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:39:18.337354 kernel: audit: type=1325 audit(1746664758.306:220): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.306000 audit[1393]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.306000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffd28d0ce0 a2=0 a3=7fffd28d0ccc items=0 ppid=1353 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:39:18.306000 audit[1395]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.306000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb53e2dd0 a2=0 a3=7ffdb53e2dbc items=0 ppid=1353 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:39:18.367000 audit[1400]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.367000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcda0094a0 a2=0 a3=7ffcda00948c items=0 ppid=1353 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.367000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:39:18.382000 audit[1402]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.382000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeeaf2a100 a2=0 a3=7ffeeaf2a0ec items=0 ppid=1353 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:39:18.384000 audit[1404]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.384000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffe523b1a0 a2=0 a3=7fffe523b18c items=0 ppid=1353 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.384000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:39:18.386000 audit[1406]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.386000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe5f079360 a2=0 a3=7ffe5f07934c items=0 ppid=1353 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:39:18.395000 audit[1410]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.395000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd603f7ac0 a2=0 a3=7ffd603f7aac items=0 ppid=1353 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:39:18.400000 audit[1411]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.400000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc3cdd3660 a2=0 a3=7ffc3cdd364c items=0 ppid=1353 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.400000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:39:18.410048 kernel: Initializing XFRM netlink socket May 8 00:39:18.437835 env[1353]: time="2025-05-08T00:39:18.437794581Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:39:18.452000 audit[1419]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.452000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc018cd6a0 a2=0 a3=7ffc018cd68c items=0 ppid=1353 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:39:18.463000 audit[1422]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.463000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe9857d1f0 a2=0 a3=7ffe9857d1dc items=0 ppid=1353 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:39:18.466000 audit[1425]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.466000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe11197020 a2=0 a3=7ffe1119700c items=0 ppid=1353 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.466000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:39:18.468000 audit[1427]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.468000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffd87b4e80 a2=0 a3=7fffd87b4e6c items=0 ppid=1353 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:39:18.470000 audit[1429]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.470000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffefe451670 a2=0 a3=7ffefe45165c items=0 ppid=1353 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.470000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:39:18.474000 audit[1432]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.474000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffeb5ba2040 a2=0 a3=7ffeb5ba202c items=0 ppid=1353 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:39:18.476000 audit[1434]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.476000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe1ade76b0 a2=0 a3=7ffe1ade769c items=0 ppid=1353 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:39:18.483000 audit[1437]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.483000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd15721be0 a2=0 a3=7ffd15721bcc items=0 ppid=1353 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.483000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:39:18.486000 audit[1439]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.486000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffddede3c30 a2=0 a3=7ffddede3c1c items=0 ppid=1353 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:39:18.488000 audit[1441]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.488000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe85e2c200 a2=0 a3=7ffe85e2c1ec items=0 ppid=1353 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.488000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:39:18.489000 audit[1443]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.489000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd179b8a30 a2=0 a3=7ffd179b8a1c items=0 ppid=1353 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:39:18.491292 systemd-networkd[1025]: docker0: Link UP May 8 00:39:18.504000 audit[1447]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.504000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd283b56e0 a2=0 a3=7ffd283b56cc items=0 ppid=1353 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.504000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:39:18.516000 audit[1448]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:18.516000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe0f6b5bc0 a2=0 a3=7ffe0f6b5bac items=0 ppid=1353 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.516000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:39:18.518287 env[1353]: time="2025-05-08T00:39:18.518247929Z" level=info msg="Loading containers: done." May 8 00:39:18.532860 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1331374151-merged.mount: Deactivated successfully. May 8 00:39:18.538571 env[1353]: time="2025-05-08T00:39:18.538515826Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:39:18.538750 env[1353]: time="2025-05-08T00:39:18.538722644Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:39:18.538859 env[1353]: time="2025-05-08T00:39:18.538837058Z" level=info msg="Daemon has completed initialization" May 8 00:39:18.559057 systemd[1]: Started docker.service. May 8 00:39:18.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:18.563342 env[1353]: time="2025-05-08T00:39:18.563263275Z" level=info msg="API listen on /run/docker.sock" May 8 00:39:19.632955 env[1200]: time="2025-05-08T00:39:19.632891291Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 8 00:39:20.308144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1177027892.mount: Deactivated successfully. May 8 00:39:22.489836 env[1200]: time="2025-05-08T00:39:22.489763798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.492499 env[1200]: time="2025-05-08T00:39:22.492436030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.494842 env[1200]: time="2025-05-08T00:39:22.494787370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.496623 env[1200]: time="2025-05-08T00:39:22.496575023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.497364 env[1200]: time="2025-05-08T00:39:22.497311294Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 8 00:39:22.498445 env[1200]: time="2025-05-08T00:39:22.498413482Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 8 00:39:25.056635 env[1200]: time="2025-05-08T00:39:25.056549624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.092155 env[1200]: time="2025-05-08T00:39:25.092078135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.533844 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:39:25.534080 systemd[1]: Stopped kubelet.service. May 8 00:39:25.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.535938 systemd[1]: Starting kubelet.service... May 8 00:39:25.541496 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:39:25.541564 kernel: audit: type=1130 audit(1746664765.533:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.550630 kernel: audit: type=1131 audit(1746664765.533:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.627686 systemd[1]: Started kubelet.service. May 8 00:39:25.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.643070 kernel: audit: type=1130 audit(1746664765.626:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:25.712728 env[1200]: time="2025-05-08T00:39:25.712661603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.720532 kubelet[1490]: E0508 00:39:25.720480 1490 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:39:25.723401 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:39:25.723536 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:39:25.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:39:25.730049 kernel: audit: type=1131 audit(1746664765.722:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:39:25.908266 env[1200]: time="2025-05-08T00:39:25.908134935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.909069 env[1200]: time="2025-05-08T00:39:25.909005518Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 8 00:39:25.909544 env[1200]: time="2025-05-08T00:39:25.909519071Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 8 00:39:27.742351 env[1200]: time="2025-05-08T00:39:27.742264037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:27.744236 env[1200]: time="2025-05-08T00:39:27.744202132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:27.746291 env[1200]: time="2025-05-08T00:39:27.746244904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:27.748480 env[1200]: time="2025-05-08T00:39:27.748419252Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:27.749462 env[1200]: time="2025-05-08T00:39:27.749406444Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 8 00:39:27.750156 env[1200]: time="2025-05-08T00:39:27.750117778Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 8 00:39:29.475554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4126378962.mount: Deactivated successfully. May 8 00:39:30.834498 env[1200]: time="2025-05-08T00:39:30.834422783Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:30.837613 env[1200]: time="2025-05-08T00:39:30.837544759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:30.839530 env[1200]: time="2025-05-08T00:39:30.839495738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:30.841212 env[1200]: time="2025-05-08T00:39:30.841165370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:30.841689 env[1200]: time="2025-05-08T00:39:30.841616346Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 8 00:39:30.842313 env[1200]: time="2025-05-08T00:39:30.842274069Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 8 00:39:31.474204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3324762720.mount: Deactivated successfully. May 8 00:39:33.434748 env[1200]: time="2025-05-08T00:39:33.434658722Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:33.467795 env[1200]: time="2025-05-08T00:39:33.467709876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:33.481940 env[1200]: time="2025-05-08T00:39:33.481849498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:33.508444 env[1200]: time="2025-05-08T00:39:33.508365425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:33.509438 env[1200]: time="2025-05-08T00:39:33.509390397Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 8 00:39:33.510129 env[1200]: time="2025-05-08T00:39:33.510073519Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 8 00:39:34.071436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount111801170.mount: Deactivated successfully. May 8 00:39:34.079802 env[1200]: time="2025-05-08T00:39:34.079766780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:34.081608 env[1200]: time="2025-05-08T00:39:34.081576615Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:34.083219 env[1200]: time="2025-05-08T00:39:34.083187847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:34.084646 env[1200]: time="2025-05-08T00:39:34.084613441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:34.085197 env[1200]: time="2025-05-08T00:39:34.085161920Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 8 00:39:34.085797 env[1200]: time="2025-05-08T00:39:34.085770792Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 8 00:39:34.638338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2536811294.mount: Deactivated successfully. May 8 00:39:35.974455 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:39:35.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:35.974635 systemd[1]: Stopped kubelet.service. May 8 00:39:35.976186 systemd[1]: Starting kubelet.service... May 8 00:39:35.990051 kernel: audit: type=1130 audit(1746664775.973:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:35.990117 kernel: audit: type=1131 audit(1746664775.973:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:35.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:36.614388 systemd[1]: Started kubelet.service. May 8 00:39:36.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:36.623051 kernel: audit: type=1130 audit(1746664776.613:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:36.740489 kubelet[1501]: E0508 00:39:36.740412 1501 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:39:36.742529 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:39:36.742661 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:39:36.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:39:36.747049 kernel: audit: type=1131 audit(1746664776.741:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:39:39.073909 env[1200]: time="2025-05-08T00:39:39.073833752Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:39.076054 env[1200]: time="2025-05-08T00:39:39.075995227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:39.078227 env[1200]: time="2025-05-08T00:39:39.078170717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:39.080234 env[1200]: time="2025-05-08T00:39:39.080206626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:39.081427 env[1200]: time="2025-05-08T00:39:39.081383664Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 8 00:39:41.841377 systemd[1]: Stopped kubelet.service. May 8 00:39:41.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:41.843722 systemd[1]: Starting kubelet.service... May 8 00:39:41.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:41.849626 kernel: audit: type=1130 audit(1746664781.840:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:41.849779 kernel: audit: type=1131 audit(1746664781.840:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:41.866582 systemd[1]: Reloading. May 8 00:39:41.949112 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2025-05-08T00:39:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:39:41.949558 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2025-05-08T00:39:41Z" level=info msg="torcx already run" May 8 00:39:42.625124 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:39:42.625142 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:39:42.644511 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:39:42.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.717684 kernel: audit: type=1400 audit(1746664782.710:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.717748 kernel: audit: type=1400 audit(1746664782.710:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.717777 kernel: audit: type=1400 audit(1746664782.710:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725002 kernel: audit: type=1400 audit(1746664782.710:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725109 kernel: audit: type=1400 audit(1746664782.710:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.731511 kernel: audit: type=1400 audit(1746664782.710:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.731577 kernel: audit: type=1400 audit(1746664782.710:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.731601 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:39:42.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit: BPF prog-id=43 op=LOAD May 8 00:39:42.713000 audit: BPF prog-id=27 op=UNLOAD May 8 00:39:42.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit: BPF prog-id=44 op=LOAD May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit: BPF prog-id=45 op=LOAD May 8 00:39:42.720000 audit: BPF prog-id=28 op=UNLOAD May 8 00:39:42.720000 audit: BPF prog-id=29 op=UNLOAD May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.723000 audit: BPF prog-id=46 op=LOAD May 8 00:39:42.724000 audit: BPF prog-id=41 op=UNLOAD May 8 00:39:42.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit: BPF prog-id=47 op=LOAD May 8 00:39:42.727000 audit: BPF prog-id=30 op=UNLOAD May 8 00:39:42.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.730000 audit: BPF prog-id=48 op=LOAD May 8 00:39:42.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.734000 audit: BPF prog-id=49 op=LOAD May 8 00:39:42.734000 audit: BPF prog-id=31 op=UNLOAD May 8 00:39:42.734000 audit: BPF prog-id=32 op=UNLOAD May 8 00:39:42.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.735000 audit: BPF prog-id=50 op=LOAD May 8 00:39:42.735000 audit: BPF prog-id=33 op=UNLOAD May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit: BPF prog-id=51 op=LOAD May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.736000 audit: BPF prog-id=52 op=LOAD May 8 00:39:42.736000 audit: BPF prog-id=34 op=UNLOAD May 8 00:39:42.736000 audit: BPF prog-id=35 op=UNLOAD May 8 00:39:42.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit: BPF prog-id=53 op=LOAD May 8 00:39:42.738000 audit: BPF prog-id=36 op=UNLOAD May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.738000 audit: BPF prog-id=54 op=LOAD May 8 00:39:42.738000 audit: BPF prog-id=37 op=UNLOAD May 8 00:39:42.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit: BPF prog-id=55 op=LOAD May 8 00:39:42.740000 audit: BPF prog-id=38 op=UNLOAD May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit: BPF prog-id=56 op=LOAD May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:42.740000 audit: BPF prog-id=57 op=LOAD May 8 00:39:42.740000 audit: BPF prog-id=39 op=UNLOAD May 8 00:39:42.740000 audit: BPF prog-id=40 op=UNLOAD May 8 00:39:42.752845 systemd[1]: Started kubelet.service. May 8 00:39:42.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:42.755960 systemd[1]: Stopping kubelet.service... May 8 00:39:42.756378 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:39:42.756539 systemd[1]: Stopped kubelet.service. May 8 00:39:42.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:42.758390 systemd[1]: Starting kubelet.service... May 8 00:39:42.855145 systemd[1]: Started kubelet.service. May 8 00:39:42.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:42.895760 kubelet[1610]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:39:42.895760 kubelet[1610]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:39:42.895760 kubelet[1610]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:39:42.895760 kubelet[1610]: I0508 00:39:42.895708 1610 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:39:43.343922 kubelet[1610]: I0508 00:39:43.343866 1610 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:39:43.343922 kubelet[1610]: I0508 00:39:43.343897 1610 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:39:43.344146 kubelet[1610]: I0508 00:39:43.344126 1610 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:39:43.374955 kubelet[1610]: E0508 00:39:43.374909 1610 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.23:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:43.376280 kubelet[1610]: I0508 00:39:43.376245 1610 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:39:43.384852 kubelet[1610]: E0508 00:39:43.384800 1610 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:39:43.384852 kubelet[1610]: I0508 00:39:43.384850 1610 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:39:43.390119 kubelet[1610]: I0508 00:39:43.390081 1610 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:39:43.391679 kubelet[1610]: I0508 00:39:43.391638 1610 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:39:43.391830 kubelet[1610]: I0508 00:39:43.391677 1610 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:39:43.391960 kubelet[1610]: I0508 00:39:43.391834 1610 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:39:43.391960 kubelet[1610]: I0508 00:39:43.391842 1610 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:39:43.391960 kubelet[1610]: I0508 00:39:43.391954 1610 state_mem.go:36] "Initialized new in-memory state store" May 8 00:39:43.395340 kubelet[1610]: I0508 00:39:43.395322 1610 kubelet.go:446] "Attempting to sync node with API server" May 8 00:39:43.395340 kubelet[1610]: I0508 00:39:43.395338 1610 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:39:43.395392 kubelet[1610]: I0508 00:39:43.395353 1610 kubelet.go:352] "Adding apiserver pod source" May 8 00:39:43.395392 kubelet[1610]: I0508 00:39:43.395361 1610 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:39:43.415585 kubelet[1610]: I0508 00:39:43.415562 1610 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:39:43.415896 kubelet[1610]: I0508 00:39:43.415877 1610 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:39:43.417374 kubelet[1610]: W0508 00:39:43.417342 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:43.417432 kubelet[1610]: E0508 00:39:43.417374 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:43.420732 kubelet[1610]: W0508 00:39:43.420706 1610 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:39:43.428526 kubelet[1610]: W0508 00:39:43.428485 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:43.428573 kubelet[1610]: E0508 00:39:43.428527 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.23:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:43.434624 kubelet[1610]: I0508 00:39:43.434601 1610 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:39:43.434684 kubelet[1610]: I0508 00:39:43.434637 1610 server.go:1287] "Started kubelet" May 8 00:39:43.434000 audit[1610]: AVC avc: denied { mac_admin } for pid=1610 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:43.434000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:43.434000 audit[1610]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf6090 a1=c000bf4240 a2=c000bf6060 a3=25 items=0 ppid=1 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:43.434000 audit[1610]: AVC avc: denied { mac_admin } for pid=1610 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:43.434000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:43.434000 audit[1610]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000712940 a1=c000bf4258 a2=c000bf6120 a3=25 items=0 ppid=1 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:43.436183 kubelet[1610]: I0508 00:39:43.435871 1610 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:39:43.436183 kubelet[1610]: I0508 00:39:43.435917 1610 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:39:43.437091 kubelet[1610]: I0508 00:39:43.437067 1610 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:39:43.439000 audit[1623]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.439000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb458a490 a2=0 a3=7ffcb458a47c items=0 ppid=1610 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:39:43.439000 audit[1624]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.439000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcf5d85b0 a2=0 a3=7fffcf5d859c items=0 ppid=1610 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:39:43.442640 kubelet[1610]: I0508 00:39:43.442610 1610 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:39:43.443985 kubelet[1610]: I0508 00:39:43.443962 1610 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:39:43.444178 kubelet[1610]: E0508 00:39:43.444154 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:43.444000 audit[1626]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.444000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe297d4750 a2=0 a3=7ffe297d473c items=0 ppid=1610 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:39:43.445421 kubelet[1610]: I0508 00:39:43.445176 1610 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:39:43.445421 kubelet[1610]: I0508 00:39:43.445361 1610 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:39:43.445421 kubelet[1610]: I0508 00:39:43.445407 1610 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:39:43.446502 kubelet[1610]: I0508 00:39:43.446149 1610 server.go:490] "Adding debug handlers to kubelet server" May 8 00:39:43.446560 kubelet[1610]: E0508 00:39:43.446511 1610 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="200ms" May 8 00:39:43.446856 kubelet[1610]: I0508 00:39:43.446823 1610 factory.go:221] Registration of the systemd container factory successfully May 8 00:39:43.446926 kubelet[1610]: I0508 00:39:43.446904 1610 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:39:43.447002 kubelet[1610]: I0508 00:39:43.446986 1610 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:39:43.447438 kubelet[1610]: W0508 00:39:43.447394 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:43.447438 kubelet[1610]: E0508 00:39:43.447427 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:43.447959 kubelet[1610]: I0508 00:39:43.447674 1610 reconciler.go:26] "Reconciler: start to sync state" May 8 00:39:43.448172 kubelet[1610]: I0508 00:39:43.448147 1610 factory.go:221] Registration of the containerd container factory successfully May 8 00:39:43.448000 audit[1628]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.448000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff08f3f2a0 a2=0 a3=7fff08f3f28c items=0 ppid=1610 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:39:43.450530 kubelet[1610]: E0508 00:39:43.449242 1610 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.23:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.23:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d665dc64e0608 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:39:43.43461428 +0000 UTC m=+0.575810697,LastTimestamp:2025-05-08 00:39:43.43461428 +0000 UTC m=+0.575810697,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:39:43.455000 audit[1633]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.455000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcd3914610 a2=0 a3=7ffcd39145fc items=0 ppid=1610 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:39:43.456993 kubelet[1610]: I0508 00:39:43.456941 1610 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:39:43.456000 audit[1636]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:43.456000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd97601ff0 a2=0 a3=7ffd97601fdc items=0 ppid=1610 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:39:43.458131 kubelet[1610]: I0508 00:39:43.458102 1610 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:39:43.458131 kubelet[1610]: I0508 00:39:43.458127 1610 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:39:43.457000 audit[1637]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.457000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd40e0790 a2=0 a3=7fffd40e077c items=0 ppid=1610 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:39:43.458365 kubelet[1610]: I0508 00:39:43.458150 1610 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:39:43.458365 kubelet[1610]: I0508 00:39:43.458159 1610 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:39:43.458365 kubelet[1610]: E0508 00:39:43.458209 1610 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:39:43.458000 audit[1639]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:43.458000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc8098890 a2=0 a3=7ffcc809887c items=0 ppid=1610 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:39:43.459512 kubelet[1610]: W0508 00:39:43.459476 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:43.459559 kubelet[1610]: E0508 00:39:43.459522 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:43.459000 audit[1642]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.459000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd27e52d0 a2=0 a3=7ffcd27e52bc items=0 ppid=1610 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:39:43.460679 kubelet[1610]: I0508 00:39:43.460659 1610 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:39:43.460679 kubelet[1610]: I0508 00:39:43.460675 1610 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:39:43.460767 kubelet[1610]: I0508 00:39:43.460693 1610 state_mem.go:36] "Initialized new in-memory state store" May 8 00:39:43.460000 audit[1643]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:43.460000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa4ace290 a2=0 a3=7fffa4ace27c items=0 ppid=1610 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:39:43.460000 audit[1641]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:43.460000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd228152a0 a2=0 a3=7ffd2281528c items=0 ppid=1610 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:39:43.461000 audit[1645]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:43.461000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc60c56170 a2=0 a3=7ffc60c5615c items=0 ppid=1610 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:39:43.544379 kubelet[1610]: E0508 00:39:43.544327 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:43.558562 kubelet[1610]: E0508 00:39:43.558502 1610 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:39:43.644968 kubelet[1610]: E0508 00:39:43.644804 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:43.647393 kubelet[1610]: E0508 00:39:43.647348 1610 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="400ms" May 8 00:39:43.745741 kubelet[1610]: E0508 00:39:43.745687 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:43.759114 kubelet[1610]: E0508 00:39:43.759081 1610 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:39:43.846385 kubelet[1610]: E0508 00:39:43.846325 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:43.947577 kubelet[1610]: E0508 00:39:43.947417 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:44.048399 kubelet[1610]: E0508 00:39:44.048333 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:44.048834 kubelet[1610]: E0508 00:39:44.048779 1610 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="800ms" May 8 00:39:44.147873 kubelet[1610]: I0508 00:39:44.147801 1610 policy_none.go:49] "None policy: Start" May 8 00:39:44.147873 kubelet[1610]: I0508 00:39:44.147863 1610 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:39:44.147873 kubelet[1610]: I0508 00:39:44.147882 1610 state_mem.go:35] "Initializing new in-memory state store" May 8 00:39:44.148649 kubelet[1610]: E0508 00:39:44.148599 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:44.160139 kubelet[1610]: E0508 00:39:44.160079 1610 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:39:44.186610 systemd[1]: Created slice kubepods.slice. May 8 00:39:44.192046 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:39:44.195171 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:39:44.202000 audit[1610]: AVC avc: denied { mac_admin } for pid=1610 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:44.202000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:44.202000 audit[1610]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004ff440 a1=c0009b2168 a2=c0004ff410 a3=25 items=0 ppid=1 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:44.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:44.203520 kubelet[1610]: I0508 00:39:44.203103 1610 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:39:44.203520 kubelet[1610]: I0508 00:39:44.203214 1610 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:39:44.203520 kubelet[1610]: I0508 00:39:44.203411 1610 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:39:44.203520 kubelet[1610]: I0508 00:39:44.203428 1610 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:39:44.204100 kubelet[1610]: I0508 00:39:44.204072 1610 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:39:44.205067 kubelet[1610]: E0508 00:39:44.205017 1610 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:39:44.205147 kubelet[1610]: E0508 00:39:44.205120 1610 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:39:44.305243 kubelet[1610]: I0508 00:39:44.305194 1610 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:44.305881 kubelet[1610]: E0508 00:39:44.305786 1610 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" May 8 00:39:44.377015 kubelet[1610]: W0508 00:39:44.376923 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:44.377015 kubelet[1610]: E0508 00:39:44.377006 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:44.399965 kubelet[1610]: W0508 00:39:44.399891 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:44.399965 kubelet[1610]: E0508 00:39:44.399945 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:44.503753 kubelet[1610]: W0508 00:39:44.503562 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:44.503753 kubelet[1610]: E0508 00:39:44.503681 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:44.507044 kubelet[1610]: I0508 00:39:44.506999 1610 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:44.507297 kubelet[1610]: E0508 00:39:44.507262 1610 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" May 8 00:39:44.754590 kubelet[1610]: W0508 00:39:44.754363 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:44.754590 kubelet[1610]: E0508 00:39:44.754473 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.23:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:44.849686 kubelet[1610]: E0508 00:39:44.849580 1610 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="1.6s" May 8 00:39:44.910218 kubelet[1610]: I0508 00:39:44.910153 1610 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:44.910672 kubelet[1610]: E0508 00:39:44.910588 1610 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" May 8 00:39:44.973438 systemd[1]: Created slice kubepods-burstable-podbf2229be2da02dacee371540a6aca5d8.slice. May 8 00:39:44.981875 kubelet[1610]: E0508 00:39:44.981839 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:44.984513 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 8 00:39:44.986314 kubelet[1610]: E0508 00:39:44.986285 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:44.988707 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 8 00:39:44.990037 kubelet[1610]: E0508 00:39:44.989999 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:45.056708 kubelet[1610]: I0508 00:39:45.056638 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:45.056924 kubelet[1610]: I0508 00:39:45.056735 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:39:45.056924 kubelet[1610]: I0508 00:39:45.056766 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:45.056924 kubelet[1610]: I0508 00:39:45.056832 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:45.056924 kubelet[1610]: I0508 00:39:45.056854 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:45.056924 kubelet[1610]: I0508 00:39:45.056877 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:45.057123 kubelet[1610]: I0508 00:39:45.056916 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:45.057123 kubelet[1610]: I0508 00:39:45.056942 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:45.057123 kubelet[1610]: I0508 00:39:45.056964 1610 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:45.283811 kubelet[1610]: E0508 00:39:45.283748 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:45.284653 env[1200]: time="2025-05-08T00:39:45.284612248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:bf2229be2da02dacee371540a6aca5d8,Namespace:kube-system,Attempt:0,}" May 8 00:39:45.286779 kubelet[1610]: E0508 00:39:45.286740 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:45.287149 env[1200]: time="2025-05-08T00:39:45.287114331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 8 00:39:45.290299 kubelet[1610]: E0508 00:39:45.290275 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:45.290741 env[1200]: time="2025-05-08T00:39:45.290698374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 8 00:39:45.476102 kubelet[1610]: E0508 00:39:45.475964 1610 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.23:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:45.713106 kubelet[1610]: I0508 00:39:45.713061 1610 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:45.713555 kubelet[1610]: E0508 00:39:45.713499 1610 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" May 8 00:39:45.837304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1945741363.mount: Deactivated successfully. May 8 00:39:45.843771 env[1200]: time="2025-05-08T00:39:45.843694987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.848243 env[1200]: time="2025-05-08T00:39:45.848207401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.849520 env[1200]: time="2025-05-08T00:39:45.849488775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.850693 env[1200]: time="2025-05-08T00:39:45.850619886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.853990 env[1200]: time="2025-05-08T00:39:45.853933011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.856142 env[1200]: time="2025-05-08T00:39:45.856106568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.857473 env[1200]: time="2025-05-08T00:39:45.857447383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.861800 env[1200]: time="2025-05-08T00:39:45.861758629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.863541 env[1200]: time="2025-05-08T00:39:45.863502801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.865736 env[1200]: time="2025-05-08T00:39:45.865677169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.867058 env[1200]: time="2025-05-08T00:39:45.867016261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.869906 env[1200]: time="2025-05-08T00:39:45.869869964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:45.912316 env[1200]: time="2025-05-08T00:39:45.912216594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:45.912316 env[1200]: time="2025-05-08T00:39:45.912282768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:45.912501 env[1200]: time="2025-05-08T00:39:45.912294941Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:45.912501 env[1200]: time="2025-05-08T00:39:45.912442438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25ec2cc00b65cec722764cbd29f2d65e26e6064973c7d35915b613bd151531d6 pid=1663 runtime=io.containerd.runc.v2 May 8 00:39:45.920527 env[1200]: time="2025-05-08T00:39:45.920447823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:45.920753 env[1200]: time="2025-05-08T00:39:45.920709975Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:45.920860 env[1200]: time="2025-05-08T00:39:45.920836372Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:45.929553 env[1200]: time="2025-05-08T00:39:45.929463384Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29299611396123a8a9392b5a21da2f148901b04ab0df84679879351afaebfd23 pid=1681 runtime=io.containerd.runc.v2 May 8 00:39:45.968476 env[1200]: time="2025-05-08T00:39:45.968311051Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:45.968707 env[1200]: time="2025-05-08T00:39:45.968492151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:45.968707 env[1200]: time="2025-05-08T00:39:45.968529421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:45.968960 env[1200]: time="2025-05-08T00:39:45.968907981Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06656e7dfa8eb550608dc435af2ce6eb77440ae2ebc8b48a76fb2d441e276497 pid=1655 runtime=io.containerd.runc.v2 May 8 00:39:45.990117 systemd[1]: Started cri-containerd-29299611396123a8a9392b5a21da2f148901b04ab0df84679879351afaebfd23.scope. May 8 00:39:46.021313 systemd[1]: Started cri-containerd-25ec2cc00b65cec722764cbd29f2d65e26e6064973c7d35915b613bd151531d6.scope. May 8 00:39:46.028072 systemd[1]: Started cri-containerd-06656e7dfa8eb550608dc435af2ce6eb77440ae2ebc8b48a76fb2d441e276497.scope. May 8 00:39:46.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit: BPF prog-id=58 op=LOAD May 8 00:39:46.091000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1663 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235656332636330306236356365633732323736346362643239663264 May 8 00:39:46.091000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.091000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1663 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235656332636330306236356365633732323736346362643239663264 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit: BPF prog-id=59 op=LOAD May 8 00:39:46.092000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097be0 items=0 ppid=1663 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235656332636330306236356365633732323736346362643239663264 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit: BPF prog-id=60 op=LOAD May 8 00:39:46.092000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097c28 items=0 ppid=1663 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235656332636330306236356365633732323736346362643239663264 May 8 00:39:46.092000 audit: BPF prog-id=60 op=UNLOAD May 8 00:39:46.092000 audit: BPF prog-id=59 op=UNLOAD May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.092000 audit: BPF prog-id=61 op=LOAD May 8 00:39:46.092000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394038 items=0 ppid=1663 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235656332636330306236356365633732323736346362643239663264 May 8 00:39:46.107322 kubelet[1610]: W0508 00:39:46.107221 1610 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused May 8 00:39:46.107322 kubelet[1610]: E0508 00:39:46.107279 1610 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.23:6443: connect: connection refused" logger="UnhandledError" May 8 00:39:46.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.189000 audit: BPF prog-id=62 op=LOAD May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1681 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323939363131333936313233613861393339326235613231646132 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1681 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323939363131333936313233613861393339326235613231646132 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit: BPF prog-id=63 op=LOAD May 8 00:39:46.190000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00039e0c0 items=0 ppid=1681 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323939363131333936313233613861393339326235613231646132 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit: BPF prog-id=64 op=LOAD May 8 00:39:46.190000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00039e108 items=0 ppid=1681 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323939363131333936313233613861393339326235613231646132 May 8 00:39:46.190000 audit: BPF prog-id=64 op=UNLOAD May 8 00:39:46.190000 audit: BPF prog-id=63 op=UNLOAD May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.190000 audit: BPF prog-id=65 op=LOAD May 8 00:39:46.190000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039e518 items=0 ppid=1681 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323939363131333936313233613861393339326235613231646132 May 8 00:39:46.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.207000 audit: BPF prog-id=66 op=LOAD May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363536653764666138656235353036303864633433356166326365 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363536653764666138656235353036303864633433356166326365 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.208000 audit: BPF prog-id=67 op=LOAD May 8 00:39:46.208000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003676b0 items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363536653764666138656235353036303864633433356166326365 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit: BPF prog-id=68 op=LOAD May 8 00:39:46.209000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003676f8 items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363536653764666138656235353036303864633433356166326365 May 8 00:39:46.209000 audit: BPF prog-id=68 op=UNLOAD May 8 00:39:46.209000 audit: BPF prog-id=67 op=UNLOAD May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.209000 audit: BPF prog-id=69 op=LOAD May 8 00:39:46.209000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000367b08 items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363536653764666138656235353036303864633433356166326365 May 8 00:39:46.216267 env[1200]: time="2025-05-08T00:39:46.216222168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:bf2229be2da02dacee371540a6aca5d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"25ec2cc00b65cec722764cbd29f2d65e26e6064973c7d35915b613bd151531d6\"" May 8 00:39:46.217437 kubelet[1610]: E0508 00:39:46.217410 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:46.219739 env[1200]: time="2025-05-08T00:39:46.219695837Z" level=info msg="CreateContainer within sandbox \"25ec2cc00b65cec722764cbd29f2d65e26e6064973c7d35915b613bd151531d6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:39:46.229893 env[1200]: time="2025-05-08T00:39:46.229822109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"29299611396123a8a9392b5a21da2f148901b04ab0df84679879351afaebfd23\"" May 8 00:39:46.230864 kubelet[1610]: E0508 00:39:46.230836 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:46.233253 env[1200]: time="2025-05-08T00:39:46.233188412Z" level=info msg="CreateContainer within sandbox \"29299611396123a8a9392b5a21da2f148901b04ab0df84679879351afaebfd23\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:39:46.240655 env[1200]: time="2025-05-08T00:39:46.240627662Z" level=info msg="CreateContainer within sandbox \"25ec2cc00b65cec722764cbd29f2d65e26e6064973c7d35915b613bd151531d6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"393cf4504a570b8e35995610eeb21ce3917f958cb741f19baafc6fda6cfc80c7\"" May 8 00:39:46.241170 env[1200]: time="2025-05-08T00:39:46.241135085Z" level=info msg="StartContainer for \"393cf4504a570b8e35995610eeb21ce3917f958cb741f19baafc6fda6cfc80c7\"" May 8 00:39:46.250649 env[1200]: time="2025-05-08T00:39:46.250564690Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"06656e7dfa8eb550608dc435af2ce6eb77440ae2ebc8b48a76fb2d441e276497\"" May 8 00:39:46.251401 kubelet[1610]: E0508 00:39:46.251367 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:46.253332 env[1200]: time="2025-05-08T00:39:46.253288582Z" level=info msg="CreateContainer within sandbox \"06656e7dfa8eb550608dc435af2ce6eb77440ae2ebc8b48a76fb2d441e276497\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:39:46.257713 env[1200]: time="2025-05-08T00:39:46.257654010Z" level=info msg="CreateContainer within sandbox \"29299611396123a8a9392b5a21da2f148901b04ab0df84679879351afaebfd23\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5d05235910d1bcb6eaa57a98868d212c63edf3a4ce7113421ca18778e8f0621d\"" May 8 00:39:46.258093 env[1200]: time="2025-05-08T00:39:46.258056983Z" level=info msg="StartContainer for \"5d05235910d1bcb6eaa57a98868d212c63edf3a4ce7113421ca18778e8f0621d\"" May 8 00:39:46.270118 systemd[1]: Started cri-containerd-393cf4504a570b8e35995610eeb21ce3917f958cb741f19baafc6fda6cfc80c7.scope. May 8 00:39:46.271526 env[1200]: time="2025-05-08T00:39:46.271446139Z" level=info msg="CreateContainer within sandbox \"06656e7dfa8eb550608dc435af2ce6eb77440ae2ebc8b48a76fb2d441e276497\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"0e8090319a9b36bc92ab0dd7439146f855bf88f2791582529da68465827d5604\"" May 8 00:39:46.272778 env[1200]: time="2025-05-08T00:39:46.272728537Z" level=info msg="StartContainer for \"0e8090319a9b36bc92ab0dd7439146f855bf88f2791582529da68465827d5604\"" May 8 00:39:46.289619 systemd[1]: Started cri-containerd-5d05235910d1bcb6eaa57a98868d212c63edf3a4ce7113421ca18778e8f0621d.scope. May 8 00:39:46.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.292000 audit: BPF prog-id=70 op=LOAD May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1663 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336366343530346135373062386533353939353631306565623231 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1663 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336366343530346135373062386533353939353631306565623231 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit: BPF prog-id=71 op=LOAD May 8 00:39:46.293000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8870 items=0 ppid=1663 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336366343530346135373062386533353939353631306565623231 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit: BPF prog-id=72 op=LOAD May 8 00:39:46.293000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c88b8 items=0 ppid=1663 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336366343530346135373062386533353939353631306565623231 May 8 00:39:46.293000 audit: BPF prog-id=72 op=UNLOAD May 8 00:39:46.293000 audit: BPF prog-id=71 op=UNLOAD May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.293000 audit: BPF prog-id=73 op=LOAD May 8 00:39:46.293000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8cc8 items=0 ppid=1663 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336366343530346135373062386533353939353631306565623231 May 8 00:39:46.299229 systemd[1]: Started cri-containerd-0e8090319a9b36bc92ab0dd7439146f855bf88f2791582529da68465827d5604.scope. May 8 00:39:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.319000 audit: BPF prog-id=74 op=LOAD May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1681 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303532333539313064316263623665616135376139383836386432 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1681 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303532333539313064316263623665616135376139383836386432 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit: BPF prog-id=75 op=LOAD May 8 00:39:46.320000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000091480 items=0 ppid=1681 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303532333539313064316263623665616135376139383836386432 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.320000 audit: BPF prog-id=76 op=LOAD May 8 00:39:46.320000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000914c8 items=0 ppid=1681 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303532333539313064316263623665616135376139383836386432 May 8 00:39:46.321000 audit: BPF prog-id=76 op=UNLOAD May 8 00:39:46.321000 audit: BPF prog-id=75 op=UNLOAD May 8 00:39:46.321000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.321000 audit: BPF prog-id=77 op=LOAD May 8 00:39:46.321000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000918d8 items=0 ppid=1681 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303532333539313064316263623665616135376139383836386432 May 8 00:39:46.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.362000 audit: BPF prog-id=78 op=LOAD May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1655 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383039303331396139623336626339326162306464373433393134 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1655 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383039303331396139623336626339326162306464373433393134 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit: BPF prog-id=79 op=LOAD May 8 00:39:46.365000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097af0 items=0 ppid=1655 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383039303331396139623336626339326162306464373433393134 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.365000 audit: BPF prog-id=80 op=LOAD May 8 00:39:46.365000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097b38 items=0 ppid=1655 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383039303331396139623336626339326162306464373433393134 May 8 00:39:46.365000 audit: BPF prog-id=80 op=UNLOAD May 8 00:39:46.366000 audit: BPF prog-id=79 op=UNLOAD May 8 00:39:46.366000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:46.366000 audit: BPF prog-id=81 op=LOAD May 8 00:39:46.366000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097f48 items=0 ppid=1655 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:46.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383039303331396139623336626339326162306464373433393134 May 8 00:39:46.384596 env[1200]: time="2025-05-08T00:39:46.384539620Z" level=info msg="StartContainer for \"393cf4504a570b8e35995610eeb21ce3917f958cb741f19baafc6fda6cfc80c7\" returns successfully" May 8 00:39:46.396018 env[1200]: time="2025-05-08T00:39:46.395970042Z" level=info msg="StartContainer for \"5d05235910d1bcb6eaa57a98868d212c63edf3a4ce7113421ca18778e8f0621d\" returns successfully" May 8 00:39:46.427903 env[1200]: time="2025-05-08T00:39:46.427859301Z" level=info msg="StartContainer for \"0e8090319a9b36bc92ab0dd7439146f855bf88f2791582529da68465827d5604\" returns successfully" May 8 00:39:46.450709 kubelet[1610]: E0508 00:39:46.450645 1610 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="3.2s" May 8 00:39:46.466677 kubelet[1610]: E0508 00:39:46.466633 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:46.466854 kubelet[1610]: E0508 00:39:46.466812 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:46.469250 kubelet[1610]: E0508 00:39:46.469222 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:46.469363 kubelet[1610]: E0508 00:39:46.469342 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:46.470966 kubelet[1610]: E0508 00:39:46.470935 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:46.471152 kubelet[1610]: E0508 00:39:46.471091 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:47.316227 kubelet[1610]: I0508 00:39:47.315668 1610 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:47.473712 kubelet[1610]: E0508 00:39:47.473665 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:47.473896 kubelet[1610]: E0508 00:39:47.473816 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:47.474308 kubelet[1610]: E0508 00:39:47.474273 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:47.474391 kubelet[1610]: E0508 00:39:47.474380 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:47.649000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:47.662304 kernel: kauditd_printk_skb: 559 callbacks suppressed May 8 00:39:47.662501 kernel: audit: type=1400 audit(1746664787.649:549): avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:47.662535 kernel: audit: type=1300 audit(1746664787.649:549): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005fa360 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:47.649000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005fa360 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:47.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:47.668040 kernel: audit: type=1327 audit(1746664787.649:549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:47.668184 kernel: audit: type=1400 audit(1746664787.651:550): avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:47.651000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:47.651000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005099e0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:47.678919 kernel: audit: type=1300 audit(1746664787.651:550): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005099e0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:47.679251 kernel: audit: type=1327 audit(1746664787.651:550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:47.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:47.773947 kubelet[1610]: E0508 00:39:47.773906 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:47.774125 kubelet[1610]: E0508 00:39:47.774061 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:48.039000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.039000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0082af6e0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.049354 kernel: audit: type=1400 audit(1746664788.039:551): avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.049511 kernel: audit: type=1300 audit(1746664788.039:551): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0082af6e0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.049549 kernel: audit: type=1327 audit(1746664788.039:551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.039000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.040000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.058069 kernel: audit: type=1400 audit(1746664788.040:552): avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.040000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005c85530 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.060000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.060000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0045bc000 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.060000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.061000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.061000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0045bc2a0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.061000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.069000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.069000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c002419380 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.069000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.070000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:48.070000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c003a67ef0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:39:48.070000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:48.178840 kubelet[1610]: I0508 00:39:48.178786 1610 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:39:48.178840 kubelet[1610]: E0508 00:39:48.178822 1610 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 8 00:39:48.189897 kubelet[1610]: E0508 00:39:48.189866 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.290461 kubelet[1610]: E0508 00:39:48.290411 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.390922 kubelet[1610]: E0508 00:39:48.390777 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.475497 kubelet[1610]: E0508 00:39:48.475459 1610 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:39:48.475674 kubelet[1610]: E0508 00:39:48.475605 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:48.491740 kubelet[1610]: E0508 00:39:48.491687 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.592585 kubelet[1610]: E0508 00:39:48.592523 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.693548 kubelet[1610]: E0508 00:39:48.693390 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.794513 kubelet[1610]: E0508 00:39:48.794455 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.894949 kubelet[1610]: E0508 00:39:48.894867 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:48.995483 kubelet[1610]: E0508 00:39:48.995326 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.096214 kubelet[1610]: E0508 00:39:49.096143 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.196851 kubelet[1610]: E0508 00:39:49.196808 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.297614 kubelet[1610]: E0508 00:39:49.297576 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.398560 kubelet[1610]: E0508 00:39:49.398510 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.499298 kubelet[1610]: E0508 00:39:49.499238 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.600253 kubelet[1610]: E0508 00:39:49.600093 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.701244 kubelet[1610]: E0508 00:39:49.701179 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.801569 kubelet[1610]: E0508 00:39:49.801506 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:49.902832 kubelet[1610]: E0508 00:39:49.902609 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.003754 kubelet[1610]: E0508 00:39:50.003687 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.104657 kubelet[1610]: E0508 00:39:50.104590 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.205611 kubelet[1610]: E0508 00:39:50.205442 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.305858 kubelet[1610]: E0508 00:39:50.305801 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.406783 kubelet[1610]: E0508 00:39:50.406723 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.507545 kubelet[1610]: E0508 00:39:50.507391 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.608319 kubelet[1610]: E0508 00:39:50.608258 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.708622 kubelet[1610]: E0508 00:39:50.708568 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.808781 kubelet[1610]: E0508 00:39:50.808710 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:50.909703 kubelet[1610]: E0508 00:39:50.909617 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:51.010769 kubelet[1610]: E0508 00:39:51.010693 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:51.111807 kubelet[1610]: E0508 00:39:51.111641 1610 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:39:51.159000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:39:51.159000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00019ec40 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:51.159000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:51.244571 kubelet[1610]: I0508 00:39:51.244519 1610 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:39:51.255248 kubelet[1610]: I0508 00:39:51.255209 1610 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:39:51.265135 kubelet[1610]: I0508 00:39:51.265092 1610 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:39:51.309774 systemd[1]: Reloading. May 8 00:39:51.419363 kubelet[1610]: I0508 00:39:51.419249 1610 apiserver.go:52] "Watching apiserver" May 8 00:39:51.421599 kubelet[1610]: E0508 00:39:51.421571 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:51.421816 kubelet[1610]: E0508 00:39:51.421790 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:51.422012 kubelet[1610]: E0508 00:39:51.421989 1610 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:51.423517 /usr/lib/systemd/system-generators/torcx-generator[1912]: time="2025-05-08T00:39:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:39:51.423798 /usr/lib/systemd/system-generators/torcx-generator[1912]: time="2025-05-08T00:39:51Z" level=info msg="torcx already run" May 8 00:39:51.448090 kubelet[1610]: I0508 00:39:51.448047 1610 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:39:51.490892 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:39:51.490910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:39:51.505000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:51.505000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000999a20 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:51.505000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:51.505000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:51.505000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a84fc0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:51.505000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:51.506000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:51.506000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e10f60 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:51.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:51.506000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:51.506000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e10fa0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:39:51.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:51.508508 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:39:51.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.587000 audit: BPF prog-id=82 op=LOAD May 8 00:39:51.588000 audit: BPF prog-id=62 op=UNLOAD May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit: BPF prog-id=83 op=LOAD May 8 00:39:51.588000 audit: BPF prog-id=43 op=UNLOAD May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit: BPF prog-id=84 op=LOAD May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.588000 audit: BPF prog-id=85 op=LOAD May 8 00:39:51.588000 audit: BPF prog-id=44 op=UNLOAD May 8 00:39:51.588000 audit: BPF prog-id=45 op=UNLOAD May 8 00:39:51.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.589000 audit: BPF prog-id=86 op=LOAD May 8 00:39:51.589000 audit: BPF prog-id=46 op=UNLOAD May 8 00:39:51.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit: BPF prog-id=87 op=LOAD May 8 00:39:51.591000 audit: BPF prog-id=74 op=UNLOAD May 8 00:39:51.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit: BPF prog-id=88 op=LOAD May 8 00:39:51.592000 audit: BPF prog-id=47 op=UNLOAD May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit: BPF prog-id=89 op=LOAD May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.592000 audit: BPF prog-id=90 op=LOAD May 8 00:39:51.592000 audit: BPF prog-id=48 op=UNLOAD May 8 00:39:51.592000 audit: BPF prog-id=49 op=UNLOAD May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit: BPF prog-id=91 op=LOAD May 8 00:39:51.593000 audit: BPF prog-id=50 op=UNLOAD May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.593000 audit: BPF prog-id=92 op=LOAD May 8 00:39:51.593000 audit: BPF prog-id=70 op=UNLOAD May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit: BPF prog-id=93 op=LOAD May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.594000 audit: BPF prog-id=94 op=LOAD May 8 00:39:51.594000 audit: BPF prog-id=51 op=UNLOAD May 8 00:39:51.594000 audit: BPF prog-id=52 op=UNLOAD May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit: BPF prog-id=95 op=LOAD May 8 00:39:51.596000 audit: BPF prog-id=53 op=UNLOAD May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit: BPF prog-id=96 op=LOAD May 8 00:39:51.597000 audit: BPF prog-id=54 op=UNLOAD May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.597000 audit: BPF prog-id=97 op=LOAD May 8 00:39:51.597000 audit: BPF prog-id=78 op=UNLOAD May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit: BPF prog-id=98 op=LOAD May 8 00:39:51.598000 audit: BPF prog-id=55 op=UNLOAD May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.598000 audit: BPF prog-id=99 op=LOAD May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit: BPF prog-id=100 op=LOAD May 8 00:39:51.599000 audit: BPF prog-id=56 op=UNLOAD May 8 00:39:51.599000 audit: BPF prog-id=57 op=UNLOAD May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.599000 audit: BPF prog-id=101 op=LOAD May 8 00:39:51.599000 audit: BPF prog-id=66 op=UNLOAD May 8 00:39:51.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.601000 audit: BPF prog-id=102 op=LOAD May 8 00:39:51.601000 audit: BPF prog-id=58 op=UNLOAD May 8 00:39:51.612397 systemd[1]: Stopping kubelet.service... May 8 00:39:51.641428 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:39:51.641818 systemd[1]: Stopped kubelet.service. May 8 00:39:51.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:51.641898 systemd[1]: kubelet.service: Consumed 1.016s CPU time. May 8 00:39:51.643726 systemd[1]: Starting kubelet.service... May 8 00:39:51.746389 systemd[1]: Started kubelet.service. May 8 00:39:51.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:51.798500 kubelet[1956]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:39:51.798500 kubelet[1956]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:39:51.798500 kubelet[1956]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:39:51.798954 kubelet[1956]: I0508 00:39:51.798547 1956 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:39:51.807348 kubelet[1956]: I0508 00:39:51.807296 1956 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:39:51.807348 kubelet[1956]: I0508 00:39:51.807337 1956 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:39:51.807872 kubelet[1956]: I0508 00:39:51.807842 1956 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:39:51.809672 kubelet[1956]: I0508 00:39:51.809602 1956 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:39:51.811755 kubelet[1956]: I0508 00:39:51.811733 1956 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:39:51.814510 kubelet[1956]: E0508 00:39:51.814466 1956 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:39:51.814510 kubelet[1956]: I0508 00:39:51.814492 1956 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:39:51.817913 kubelet[1956]: I0508 00:39:51.817888 1956 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:39:51.818157 kubelet[1956]: I0508 00:39:51.818121 1956 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:39:51.818322 kubelet[1956]: I0508 00:39:51.818150 1956 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:39:51.818322 kubelet[1956]: I0508 00:39:51.818323 1956 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:39:51.818483 kubelet[1956]: I0508 00:39:51.818331 1956 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:39:51.818483 kubelet[1956]: I0508 00:39:51.818363 1956 state_mem.go:36] "Initialized new in-memory state store" May 8 00:39:51.818549 kubelet[1956]: I0508 00:39:51.818497 1956 kubelet.go:446] "Attempting to sync node with API server" May 8 00:39:51.818549 kubelet[1956]: I0508 00:39:51.818535 1956 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:39:51.818614 kubelet[1956]: I0508 00:39:51.818556 1956 kubelet.go:352] "Adding apiserver pod source" May 8 00:39:51.818614 kubelet[1956]: I0508 00:39:51.818566 1956 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:39:51.819288 kubelet[1956]: I0508 00:39:51.819269 1956 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:39:51.819651 kubelet[1956]: I0508 00:39:51.819617 1956 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:39:51.821000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.821000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:51.821000 audit[1956]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b95470 a1=c00077f230 a2=c000b95440 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:51.821000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.821000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:51.821000 audit[1956]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d2c200 a1=c00077f248 a2=c000b95500 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:51.823579 kubelet[1956]: I0508 00:39:51.820684 1956 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:39:51.823579 kubelet[1956]: I0508 00:39:51.820719 1956 server.go:1287] "Started kubelet" May 8 00:39:51.823579 kubelet[1956]: I0508 00:39:51.822505 1956 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:39:51.823579 kubelet[1956]: I0508 00:39:51.822538 1956 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:39:51.823579 kubelet[1956]: I0508 00:39:51.822568 1956 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:39:51.833186 kubelet[1956]: I0508 00:39:51.833131 1956 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:39:51.833570 kubelet[1956]: I0508 00:39:51.833555 1956 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:39:51.833880 kubelet[1956]: I0508 00:39:51.833857 1956 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:39:51.835572 kubelet[1956]: I0508 00:39:51.835540 1956 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:39:51.835989 kubelet[1956]: I0508 00:39:51.835962 1956 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:39:51.836348 kubelet[1956]: I0508 00:39:51.836313 1956 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:39:51.836869 kubelet[1956]: I0508 00:39:51.836839 1956 reconciler.go:26] "Reconciler: start to sync state" May 8 00:39:51.837951 kubelet[1956]: I0508 00:39:51.837914 1956 server.go:490] "Adding debug handlers to kubelet server" May 8 00:39:51.838292 kubelet[1956]: I0508 00:39:51.838260 1956 factory.go:221] Registration of the systemd container factory successfully May 8 00:39:51.838496 kubelet[1956]: I0508 00:39:51.838437 1956 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:39:51.839540 kubelet[1956]: E0508 00:39:51.839514 1956 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:39:51.842347 kubelet[1956]: I0508 00:39:51.842316 1956 factory.go:221] Registration of the containerd container factory successfully May 8 00:39:51.847347 kubelet[1956]: I0508 00:39:51.847307 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:39:51.848826 kubelet[1956]: I0508 00:39:51.848809 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:39:51.848934 kubelet[1956]: I0508 00:39:51.848917 1956 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:39:51.849068 kubelet[1956]: I0508 00:39:51.849049 1956 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:39:51.849156 kubelet[1956]: I0508 00:39:51.849139 1956 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:39:51.849338 kubelet[1956]: E0508 00:39:51.849311 1956 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:39:51.874813 kubelet[1956]: I0508 00:39:51.874781 1956 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:39:51.874813 kubelet[1956]: I0508 00:39:51.874799 1956 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:39:51.874813 kubelet[1956]: I0508 00:39:51.874817 1956 state_mem.go:36] "Initialized new in-memory state store" May 8 00:39:51.875055 kubelet[1956]: I0508 00:39:51.874956 1956 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:39:51.875055 kubelet[1956]: I0508 00:39:51.874970 1956 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:39:51.875055 kubelet[1956]: I0508 00:39:51.874988 1956 policy_none.go:49] "None policy: Start" May 8 00:39:51.875055 kubelet[1956]: I0508 00:39:51.874996 1956 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:39:51.875055 kubelet[1956]: I0508 00:39:51.875004 1956 state_mem.go:35] "Initializing new in-memory state store" May 8 00:39:51.875256 kubelet[1956]: I0508 00:39:51.875164 1956 state_mem.go:75] "Updated machine memory state" May 8 00:39:51.878927 kubelet[1956]: I0508 00:39:51.878882 1956 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:39:51.877000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:51.877000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:39:51.877000 audit[1956]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b94240 a1=c00099f2a8 a2=c000b94210 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.877000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:39:51.879312 kubelet[1956]: I0508 00:39:51.878970 1956 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:39:51.879312 kubelet[1956]: I0508 00:39:51.879176 1956 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:39:51.879312 kubelet[1956]: I0508 00:39:51.879192 1956 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:39:51.879460 kubelet[1956]: I0508 00:39:51.879436 1956 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:39:51.880767 kubelet[1956]: E0508 00:39:51.880741 1956 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:39:51.950834 kubelet[1956]: I0508 00:39:51.950795 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:39:51.950997 kubelet[1956]: I0508 00:39:51.950939 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:39:51.951048 kubelet[1956]: I0508 00:39:51.950997 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:39:51.957385 kubelet[1956]: E0508 00:39:51.957344 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 8 00:39:51.957597 kubelet[1956]: E0508 00:39:51.957361 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 8 00:39:51.957697 kubelet[1956]: E0508 00:39:51.957615 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:39:51.987237 kubelet[1956]: I0508 00:39:51.987193 1956 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:39:51.995972 kubelet[1956]: I0508 00:39:51.995926 1956 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 8 00:39:51.996190 kubelet[1956]: I0508 00:39:51.996067 1956 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:39:52.037705 kubelet[1956]: I0508 00:39:52.037581 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:52.037705 kubelet[1956]: I0508 00:39:52.037674 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:52.038002 kubelet[1956]: I0508 00:39:52.037787 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:52.038002 kubelet[1956]: I0508 00:39:52.037843 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:52.038002 kubelet[1956]: I0508 00:39:52.037874 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:52.038002 kubelet[1956]: I0508 00:39:52.037907 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:52.038002 kubelet[1956]: I0508 00:39:52.037932 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:39:52.038198 kubelet[1956]: I0508 00:39:52.037967 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:39:52.038198 kubelet[1956]: I0508 00:39:52.037987 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bf2229be2da02dacee371540a6aca5d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"bf2229be2da02dacee371540a6aca5d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:39:52.258511 kubelet[1956]: E0508 00:39:52.258457 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.258691 kubelet[1956]: E0508 00:39:52.258480 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.258786 kubelet[1956]: E0508 00:39:52.258481 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.819793 kubelet[1956]: I0508 00:39:52.819727 1956 apiserver.go:52] "Watching apiserver" May 8 00:39:52.836438 kubelet[1956]: I0508 00:39:52.836382 1956 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:39:52.862739 kubelet[1956]: I0508 00:39:52.862695 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:39:52.862969 kubelet[1956]: E0508 00:39:52.862947 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.863088 kubelet[1956]: I0508 00:39:52.863064 1956 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:39:52.876257 kubelet[1956]: E0508 00:39:52.876145 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:39:52.876450 kubelet[1956]: E0508 00:39:52.876347 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.877767 kubelet[1956]: E0508 00:39:52.877731 1956 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 8 00:39:52.877876 kubelet[1956]: E0508 00:39:52.877839 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:52.964819 kubelet[1956]: I0508 00:39:52.964752 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.964729616 podStartE2EDuration="1.964729616s" podCreationTimestamp="2025-05-08 00:39:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:52.964146626 +0000 UTC m=+1.213987451" watchObservedRunningTime="2025-05-08 00:39:52.964729616 +0000 UTC m=+1.214570421" May 8 00:39:52.965124 kubelet[1956]: I0508 00:39:52.964874 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.9648700140000002 podStartE2EDuration="1.964870014s" podCreationTimestamp="2025-05-08 00:39:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:52.954401354 +0000 UTC m=+1.204242199" watchObservedRunningTime="2025-05-08 00:39:52.964870014 +0000 UTC m=+1.214710819" May 8 00:39:52.975203 kubelet[1956]: I0508 00:39:52.974396 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.974376981 podStartE2EDuration="1.974376981s" podCreationTimestamp="2025-05-08 00:39:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:52.974304353 +0000 UTC m=+1.224145188" watchObservedRunningTime="2025-05-08 00:39:52.974376981 +0000 UTC m=+1.224217796" May 8 00:39:53.864176 kubelet[1956]: E0508 00:39:53.864128 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:53.864644 kubelet[1956]: E0508 00:39:53.864411 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:55.509111 kubelet[1956]: E0508 00:39:55.509052 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:56.518604 kubelet[1956]: I0508 00:39:56.518564 1956 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:39:56.519058 env[1200]: time="2025-05-08T00:39:56.518866881Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:39:56.519256 kubelet[1956]: I0508 00:39:56.519059 1956 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:39:57.128282 systemd[1]: Created slice kubepods-besteffort-pod5344d757_93a5_4cea_8ee3_fd5c88bec86b.slice. May 8 00:39:57.194742 kubelet[1956]: I0508 00:39:57.194453 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5344d757-93a5-4cea-8ee3-fd5c88bec86b-kube-proxy\") pod \"kube-proxy-rmx2j\" (UID: \"5344d757-93a5-4cea-8ee3-fd5c88bec86b\") " pod="kube-system/kube-proxy-rmx2j" May 8 00:39:57.194742 kubelet[1956]: I0508 00:39:57.194515 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5344d757-93a5-4cea-8ee3-fd5c88bec86b-xtables-lock\") pod \"kube-proxy-rmx2j\" (UID: \"5344d757-93a5-4cea-8ee3-fd5c88bec86b\") " pod="kube-system/kube-proxy-rmx2j" May 8 00:39:57.194742 kubelet[1956]: I0508 00:39:57.194546 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5344d757-93a5-4cea-8ee3-fd5c88bec86b-lib-modules\") pod \"kube-proxy-rmx2j\" (UID: \"5344d757-93a5-4cea-8ee3-fd5c88bec86b\") " pod="kube-system/kube-proxy-rmx2j" May 8 00:39:57.194742 kubelet[1956]: I0508 00:39:57.194567 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b957h\" (UniqueName: \"kubernetes.io/projected/5344d757-93a5-4cea-8ee3-fd5c88bec86b-kube-api-access-b957h\") pod \"kube-proxy-rmx2j\" (UID: \"5344d757-93a5-4cea-8ee3-fd5c88bec86b\") " pod="kube-system/kube-proxy-rmx2j" May 8 00:39:57.206551 systemd[1]: Created slice kubepods-besteffort-pod953e15c6_70e9_4e4c_bf62_40ace4547054.slice. May 8 00:39:57.286571 kubelet[1956]: E0508 00:39:57.286506 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:57.295097 kubelet[1956]: I0508 00:39:57.295007 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4znzz\" (UniqueName: \"kubernetes.io/projected/953e15c6-70e9-4e4c-bf62-40ace4547054-kube-api-access-4znzz\") pod \"tigera-operator-789496d6f5-l75f8\" (UID: \"953e15c6-70e9-4e4c-bf62-40ace4547054\") " pod="tigera-operator/tigera-operator-789496d6f5-l75f8" May 8 00:39:57.295097 kubelet[1956]: I0508 00:39:57.295092 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/953e15c6-70e9-4e4c-bf62-40ace4547054-var-lib-calico\") pod \"tigera-operator-789496d6f5-l75f8\" (UID: \"953e15c6-70e9-4e4c-bf62-40ace4547054\") " pod="tigera-operator/tigera-operator-789496d6f5-l75f8" May 8 00:39:57.373426 kubelet[1956]: I0508 00:39:57.373384 1956 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:39:57.436867 kubelet[1956]: E0508 00:39:57.436671 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:57.442375 env[1200]: time="2025-05-08T00:39:57.442315682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rmx2j,Uid:5344d757-93a5-4cea-8ee3-fd5c88bec86b,Namespace:kube-system,Attempt:0,}" May 8 00:39:57.513248 env[1200]: time="2025-05-08T00:39:57.513185670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-l75f8,Uid:953e15c6-70e9-4e4c-bf62-40ace4547054,Namespace:tigera-operator,Attempt:0,}" May 8 00:39:57.870645 kubelet[1956]: E0508 00:39:57.870587 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:58.407981 env[1200]: time="2025-05-08T00:39:58.407899411Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:58.407981 env[1200]: time="2025-05-08T00:39:58.407939135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:58.407981 env[1200]: time="2025-05-08T00:39:58.407948504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:58.408419 env[1200]: time="2025-05-08T00:39:58.408087757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7 pid=2038 runtime=io.containerd.runc.v2 May 8 00:39:58.424723 env[1200]: time="2025-05-08T00:39:58.423999726Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:58.424723 env[1200]: time="2025-05-08T00:39:58.424094065Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:58.424723 env[1200]: time="2025-05-08T00:39:58.424139170Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:58.424723 env[1200]: time="2025-05-08T00:39:58.424566029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f6dc3e375826601b70fdec0f30f79f994db4950eb5fdebd8e22dbc7963f506fc pid=2066 runtime=io.containerd.runc.v2 May 8 00:39:58.425794 systemd[1]: run-containerd-runc-k8s.io-c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7-runc.4v8IBP.mount: Deactivated successfully. May 8 00:39:58.427557 systemd[1]: Started cri-containerd-c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7.scope. May 8 00:39:58.435889 systemd[1]: Started cri-containerd-f6dc3e375826601b70fdec0f30f79f994db4950eb5fdebd8e22dbc7963f506fc.scope. May 8 00:39:58.446453 kernel: kauditd_printk_skb: 287 callbacks suppressed May 8 00:39:58.446702 kernel: audit: type=1400 audit(1746664798.437:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446728 kernel: audit: type=1400 audit(1746664798.437:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446744 kernel: audit: type=1400 audit(1746664798.437:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.451196 kernel: audit: type=1400 audit(1746664798.437:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.456045 kernel: audit: type=1400 audit(1746664798.437:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.456095 kernel: audit: type=1400 audit(1746664798.437:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462281 kernel: audit: type=1400 audit(1746664798.437:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462329 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:39:58.462349 kernel: audit: type=1400 audit(1746664798.437:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462389 kernel: audit: type=1400 audit(1746664798.437:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit: BPF prog-id=103 op=LOAD May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2038 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337636432383233333238333639633233633763383262323536313261 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2038 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337636432383233333238333639633233633763383262323536313261 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit: BPF prog-id=104 op=LOAD May 8 00:39:58.446000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.446000 audit: BPF prog-id=105 op=LOAD May 8 00:39:58.446000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098910 items=0 ppid=2038 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337636432383233333238333639633233633763383262323536313261 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2066 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646333653337353832363630316237306664656330663330663739 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2066 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646333653337353832363630316237306664656330663330663739 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit: BPF prog-id=106 op=LOAD May 8 00:39:58.452000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b6fd0 items=0 ppid=2066 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646333653337353832363630316237306664656330663330663739 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.461000 audit: BPF prog-id=108 op=LOAD May 8 00:39:58.461000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b7018 items=0 ppid=2066 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646333653337353832363630316237306664656330663330663739 May 8 00:39:58.462000 audit: BPF prog-id=108 op=UNLOAD May 8 00:39:58.462000 audit: BPF prog-id=106 op=UNLOAD May 8 00:39:58.462000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.462000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.452000 audit: BPF prog-id=107 op=LOAD May 8 00:39:58.462000 audit: BPF prog-id=109 op=LOAD May 8 00:39:58.462000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b7428 items=0 ppid=2066 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646333653337353832363630316237306664656330663330663739 May 8 00:39:58.452000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098958 items=0 ppid=2038 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337636432383233333238333639633233633763383262323536313261 May 8 00:39:58.468000 audit: BPF prog-id=107 op=UNLOAD May 8 00:39:58.468000 audit: BPF prog-id=105 op=UNLOAD May 8 00:39:58.468000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:58.468000 audit: BPF prog-id=110 op=LOAD May 8 00:39:58.468000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098d68 items=0 ppid=2038 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:58.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337636432383233333238333639633233633763383262323536313261 May 8 00:39:58.477454 update_engine[1190]: I0508 00:39:58.477140 1190 update_attempter.cc:509] Updating boot flags... May 8 00:39:58.487847 env[1200]: time="2025-05-08T00:39:58.487803566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rmx2j,Uid:5344d757-93a5-4cea-8ee3-fd5c88bec86b,Namespace:kube-system,Attempt:0,} returns sandbox id \"c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7\"" May 8 00:39:58.489758 kubelet[1956]: E0508 00:39:58.489073 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:58.492358 env[1200]: time="2025-05-08T00:39:58.492316386Z" level=info msg="CreateContainer within sandbox \"c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:39:58.502492 env[1200]: time="2025-05-08T00:39:58.502441350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-l75f8,Uid:953e15c6-70e9-4e4c-bf62-40ace4547054,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f6dc3e375826601b70fdec0f30f79f994db4950eb5fdebd8e22dbc7963f506fc\"" May 8 00:39:58.503938 env[1200]: time="2025-05-08T00:39:58.503916906Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:39:59.026010 env[1200]: time="2025-05-08T00:39:59.025928277Z" level=info msg="CreateContainer within sandbox \"c7cd2823328369c23c7c82b25612a8358485ce7694801ca67890d519f5666fc7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"92250a546082898e72b3476cd0d4b46efd96888af2abc24e7c2b56c8f3955aa7\"" May 8 00:39:59.026654 env[1200]: time="2025-05-08T00:39:59.026605009Z" level=info msg="StartContainer for \"92250a546082898e72b3476cd0d4b46efd96888af2abc24e7c2b56c8f3955aa7\"" May 8 00:39:59.042852 systemd[1]: Started cri-containerd-92250a546082898e72b3476cd0d4b46efd96888af2abc24e7c2b56c8f3955aa7.scope. May 8 00:39:59.056000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.056000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f120c117aa8 items=0 ppid=2038 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323530613534363038323839386537326233343736636430643462 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.057000 audit: BPF prog-id=111 op=LOAD May 8 00:39:59.057000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d82c8 items=0 ppid=2038 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323530613534363038323839386537326233343736636430643462 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.058000 audit: BPF prog-id=112 op=LOAD May 8 00:39:59.058000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d8318 items=0 ppid=2038 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323530613534363038323839386537326233343736636430643462 May 8 00:39:59.058000 audit: BPF prog-id=112 op=UNLOAD May 8 00:39:59.058000 audit: BPF prog-id=111 op=UNLOAD May 8 00:39:59.059000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:59.059000 audit: BPF prog-id=113 op=LOAD May 8 00:39:59.059000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d83a8 items=0 ppid=2038 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323530613534363038323839386537326233343736636430643462 May 8 00:39:59.191377 env[1200]: time="2025-05-08T00:39:59.191319870Z" level=info msg="StartContainer for \"92250a546082898e72b3476cd0d4b46efd96888af2abc24e7c2b56c8f3955aa7\" returns successfully" May 8 00:39:59.209000 audit[2198]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.209000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff76bdf2a0 a2=0 a3=7fff76bdf28c items=0 ppid=2148 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:39:59.210000 audit[2199]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.210000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4f0b1c60 a2=0 a3=7ffc4f0b1c4c items=0 ppid=2148 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:39:59.210000 audit[2200]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.210000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe111f1e10 a2=0 a3=7ffe111f1dfc items=0 ppid=2148 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:39:59.211000 audit[2201]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.211000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2e659bc0 a2=0 a3=7ffc2e659bac items=0 ppid=2148 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:39:59.212000 audit[2203]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.212000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea45b21c0 a2=0 a3=7ffea45b21ac items=0 ppid=2148 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:39:59.212000 audit[2202]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.212000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd61f55dc0 a2=0 a3=7ffd61f55dac items=0 ppid=2148 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:39:59.312000 audit[2204]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.312000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff928d3ab0 a2=0 a3=7fff928d3a9c items=0 ppid=2148 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:39:59.315000 audit[2206]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.315000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffef10ce30 a2=0 a3=7fffef10ce1c items=0 ppid=2148 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:39:59.319000 audit[2209]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.319000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd97e2e1d0 a2=0 a3=7ffd97e2e1bc items=0 ppid=2148 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:39:59.320000 audit[2210]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.320000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc624212f0 a2=0 a3=7ffc624212dc items=0 ppid=2148 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:39:59.322000 audit[2212]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.322000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff44ae02f0 a2=0 a3=7fff44ae02dc items=0 ppid=2148 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:39:59.323000 audit[2213]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.323000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07e92220 a2=0 a3=7ffe07e9220c items=0 ppid=2148 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:39:59.325000 audit[2215]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.325000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9a38d980 a2=0 a3=7ffe9a38d96c items=0 ppid=2148 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:39:59.329000 audit[2218]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.329000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb6924d30 a2=0 a3=7ffeb6924d1c items=0 ppid=2148 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:39:59.330000 audit[2219]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.330000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5a7a30b0 a2=0 a3=7ffd5a7a309c items=0 ppid=2148 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:39:59.333000 audit[2221]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.333000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0c4586a0 a2=0 a3=7ffc0c45868c items=0 ppid=2148 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:39:59.334000 audit[2222]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.334000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaa448960 a2=0 a3=7ffeaa44894c items=0 ppid=2148 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:39:59.336000 audit[2224]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.336000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe20f36a40 a2=0 a3=7ffe20f36a2c items=0 ppid=2148 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:39:59.339000 audit[2227]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.339000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffede9a0a50 a2=0 a3=7ffede9a0a3c items=0 ppid=2148 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:39:59.342000 audit[2230]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.342000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff37605a00 a2=0 a3=7fff376059ec items=0 ppid=2148 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:39:59.343000 audit[2231]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.343000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeeb8445c0 a2=0 a3=7ffeeb8445ac items=0 ppid=2148 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:39:59.345000 audit[2233]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.345000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe8e8b39b0 a2=0 a3=7ffe8e8b399c items=0 ppid=2148 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:39:59.349000 audit[2236]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.349000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf177d690 a2=0 a3=7ffdf177d67c items=0 ppid=2148 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:39:59.350000 audit[2237]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.350000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdefef2670 a2=0 a3=7ffdefef265c items=0 ppid=2148 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:39:59.352000 audit[2239]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:39:59.352000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe242ea1a0 a2=0 a3=7ffe242ea18c items=0 ppid=2148 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:39:59.382000 audit[2245]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:59.382000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc2bd9a480 a2=0 a3=7ffc2bd9a46c items=0 ppid=2148 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:59.392000 audit[2245]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:59.392000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc2bd9a480 a2=0 a3=7ffc2bd9a46c items=0 ppid=2148 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:59.393000 audit[2250]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.393000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff1a33e930 a2=0 a3=7fff1a33e91c items=0 ppid=2148 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:39:59.395000 audit[2252]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.395000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb6f01150 a2=0 a3=7ffcb6f0113c items=0 ppid=2148 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:39:59.399000 audit[2255]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.399000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc9714b10 a2=0 a3=7ffcc9714afc items=0 ppid=2148 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:39:59.400000 audit[2256]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.400000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3abdad20 a2=0 a3=7fff3abdad0c items=0 ppid=2148 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:39:59.405000 audit[2258]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.405000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce69fe2a0 a2=0 a3=7ffce69fe28c items=0 ppid=2148 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:39:59.406000 audit[2259]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.406000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc93aed250 a2=0 a3=7ffc93aed23c items=0 ppid=2148 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:39:59.408000 audit[2261]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.408000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5c432ee0 a2=0 a3=7fff5c432ecc items=0 ppid=2148 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:39:59.411000 audit[2264]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.411000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdc2ccda90 a2=0 a3=7ffdc2ccda7c items=0 ppid=2148 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:39:59.412000 audit[2265]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.412000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07accea0 a2=0 a3=7ffe07acce8c items=0 ppid=2148 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:39:59.414000 audit[2267]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.414000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5b14e960 a2=0 a3=7ffc5b14e94c items=0 ppid=2148 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:39:59.415000 audit[2268]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.415000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4722b290 a2=0 a3=7ffe4722b27c items=0 ppid=2148 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:39:59.417000 audit[2270]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.417000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff104e4c80 a2=0 a3=7fff104e4c6c items=0 ppid=2148 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:39:59.420000 audit[2273]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.420000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7d068410 a2=0 a3=7ffe7d0683fc items=0 ppid=2148 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:39:59.423000 audit[2276]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.423000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb0f34810 a2=0 a3=7ffeb0f347fc items=0 ppid=2148 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:39:59.424000 audit[2277]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.424000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff854af3a0 a2=0 a3=7fff854af38c items=0 ppid=2148 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:39:59.426000 audit[2279]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.426000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc3155ff20 a2=0 a3=7ffc3155ff0c items=0 ppid=2148 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:39:59.429000 audit[2282]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.429000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5482e760 a2=0 a3=7ffe5482e74c items=0 ppid=2148 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:39:59.430000 audit[2283]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.430000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5c8b7090 a2=0 a3=7ffc5c8b707c items=0 ppid=2148 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:39:59.433000 audit[2285]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.433000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd2f7023e0 a2=0 a3=7ffd2f7023cc items=0 ppid=2148 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:39:59.434000 audit[2286]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.434000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa94b7a60 a2=0 a3=7fffa94b7a4c items=0 ppid=2148 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:39:59.436000 audit[2288]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.436000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd00725b30 a2=0 a3=7ffd00725b1c items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:39:59.439000 audit[2291]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:39:59.439000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd06dde90 a2=0 a3=7fffd06dde7c items=0 ppid=2148 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:39:59.442000 audit[2293]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:39:59.442000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc6bcc3360 a2=0 a3=7ffc6bcc334c items=0 ppid=2148 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.442000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:59.442000 audit[2293]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:39:59.442000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc6bcc3360 a2=0 a3=7ffc6bcc334c items=0 ppid=2148 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:59.442000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:59.876668 kubelet[1956]: E0508 00:39:59.876628 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:00.459460 sudo[1341]: pam_unix(sudo:session): session closed for user root May 8 00:40:00.458000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:00.458000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:00.461526 sshd[1338]: pam_unix(sshd:session): session closed for user core May 8 00:40:00.461000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:00.461000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:00.464013 systemd[1]: sshd@6-10.0.0.23:22-10.0.0.1:57730.service: Deactivated successfully. May 8 00:40:00.464727 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:40:00.464861 systemd[1]: session-7.scope: Consumed 5.239s CPU time. May 8 00:40:00.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.23:22-10.0.0.1:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:00.465305 systemd-logind[1189]: Session 7 logged out. Waiting for processes to exit. May 8 00:40:00.466020 systemd-logind[1189]: Removed session 7. May 8 00:40:00.570524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1771731922.mount: Deactivated successfully. May 8 00:40:00.878656 kubelet[1956]: E0508 00:40:00.878139 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:01.429803 env[1200]: time="2025-05-08T00:40:01.429747021Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:01.431913 env[1200]: time="2025-05-08T00:40:01.431870837Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:01.433598 env[1200]: time="2025-05-08T00:40:01.433560413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:01.435087 env[1200]: time="2025-05-08T00:40:01.435043408Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:01.435517 env[1200]: time="2025-05-08T00:40:01.435483050Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 8 00:40:01.437964 env[1200]: time="2025-05-08T00:40:01.437917965Z" level=info msg="CreateContainer within sandbox \"f6dc3e375826601b70fdec0f30f79f994db4950eb5fdebd8e22dbc7963f506fc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:40:01.451149 env[1200]: time="2025-05-08T00:40:01.451091601Z" level=info msg="CreateContainer within sandbox \"f6dc3e375826601b70fdec0f30f79f994db4950eb5fdebd8e22dbc7963f506fc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"45b6583364ca046faab822bf75df50c095919178eb35b3719e8aeabc79220e10\"" May 8 00:40:01.451543 env[1200]: time="2025-05-08T00:40:01.451511405Z" level=info msg="StartContainer for \"45b6583364ca046faab822bf75df50c095919178eb35b3719e8aeabc79220e10\"" May 8 00:40:01.469104 systemd[1]: Started cri-containerd-45b6583364ca046faab822bf75df50c095919178eb35b3719e8aeabc79220e10.scope. May 8 00:40:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit: BPF prog-id=114 op=LOAD May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2066 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623635383333363463613034366661616238323262663735646635 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2066 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623635383333363463613034366661616238323262663735646635 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit: BPF prog-id=115 op=LOAD May 8 00:40:01.483000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094c00 items=0 ppid=2066 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623635383333363463613034366661616238323262663735646635 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.483000 audit: BPF prog-id=116 op=LOAD May 8 00:40:01.483000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094c48 items=0 ppid=2066 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623635383333363463613034366661616238323262663735646635 May 8 00:40:01.483000 audit: BPF prog-id=116 op=UNLOAD May 8 00:40:01.483000 audit: BPF prog-id=115 op=UNLOAD May 8 00:40:01.484000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:01.484000 audit: BPF prog-id=117 op=LOAD May 8 00:40:01.484000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095058 items=0 ppid=2066 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623635383333363463613034366661616238323262663735646635 May 8 00:40:01.502381 env[1200]: time="2025-05-08T00:40:01.502324521Z" level=info msg="StartContainer for \"45b6583364ca046faab822bf75df50c095919178eb35b3719e8aeabc79220e10\" returns successfully" May 8 00:40:01.909914 kubelet[1956]: I0508 00:40:01.909764 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rmx2j" podStartSLOduration=4.909742399 podStartE2EDuration="4.909742399s" podCreationTimestamp="2025-05-08 00:39:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:59.885914262 +0000 UTC m=+8.135755067" watchObservedRunningTime="2025-05-08 00:40:01.909742399 +0000 UTC m=+10.159583214" May 8 00:40:01.911046 kubelet[1956]: I0508 00:40:01.910866 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-l75f8" podStartSLOduration=1.9778971859999999 podStartE2EDuration="4.910851597s" podCreationTimestamp="2025-05-08 00:39:57 +0000 UTC" firstStartedPulling="2025-05-08 00:39:58.503512038 +0000 UTC m=+6.753352843" lastFinishedPulling="2025-05-08 00:40:01.436466439 +0000 UTC m=+9.686307254" observedRunningTime="2025-05-08 00:40:01.910806021 +0000 UTC m=+10.160646826" watchObservedRunningTime="2025-05-08 00:40:01.910851597 +0000 UTC m=+10.160692422" May 8 00:40:02.187702 kubelet[1956]: E0508 00:40:02.187560 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:02.881956 kubelet[1956]: E0508 00:40:02.881911 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:04.804507 kernel: kauditd_printk_skb: 364 callbacks suppressed May 8 00:40:04.804679 kernel: audit: type=1325 audit(1746664804.794:927): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.804709 kernel: audit: type=1300 audit(1746664804.794:927): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef0857770 a2=0 a3=7ffef085775c items=0 ppid=2148 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.794000 audit[2355]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.794000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef0857770 a2=0 a3=7ffef085775c items=0 ppid=2148 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.808196 kernel: audit: type=1327 audit(1746664804.794:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.808000 audit[2355]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.808000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef0857770 a2=0 a3=0 items=0 ppid=2148 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.819123 kernel: audit: type=1325 audit(1746664804.808:928): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.819299 kernel: audit: type=1300 audit(1746664804.808:928): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef0857770 a2=0 a3=0 items=0 ppid=2148 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.819362 kernel: audit: type=1327 audit(1746664804.808:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.829000 audit[2357]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.829000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff76e292d0 a2=0 a3=7fff76e292bc items=0 ppid=2148 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.839231 kernel: audit: type=1325 audit(1746664804.829:929): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.839443 kernel: audit: type=1300 audit(1746664804.829:929): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff76e292d0 a2=0 a3=7fff76e292bc items=0 ppid=2148 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.839488 kernel: audit: type=1327 audit(1746664804.829:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.842000 audit[2357]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.842000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff76e292d0 a2=0 a3=0 items=0 ppid=2148 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:04.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:04.847086 kernel: audit: type=1325 audit(1746664804.842:930): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:04.890209 systemd[1]: Created slice kubepods-besteffort-podfdd0525a_4582_4596_9983_7077998b5a60.slice. May 8 00:40:04.943283 systemd[1]: Created slice kubepods-besteffort-podd3fec65a_591d_45b8_930d_9780cc2581cc.slice. May 8 00:40:04.946339 kubelet[1956]: I0508 00:40:04.946268 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c2878\" (UniqueName: \"kubernetes.io/projected/fdd0525a-4582-4596-9983-7077998b5a60-kube-api-access-c2878\") pod \"calico-typha-66666f47b7-vq8cq\" (UID: \"fdd0525a-4582-4596-9983-7077998b5a60\") " pod="calico-system/calico-typha-66666f47b7-vq8cq" May 8 00:40:04.946652 kubelet[1956]: I0508 00:40:04.946347 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fdd0525a-4582-4596-9983-7077998b5a60-typha-certs\") pod \"calico-typha-66666f47b7-vq8cq\" (UID: \"fdd0525a-4582-4596-9983-7077998b5a60\") " pod="calico-system/calico-typha-66666f47b7-vq8cq" May 8 00:40:04.946652 kubelet[1956]: I0508 00:40:04.946373 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fdd0525a-4582-4596-9983-7077998b5a60-tigera-ca-bundle\") pod \"calico-typha-66666f47b7-vq8cq\" (UID: \"fdd0525a-4582-4596-9983-7077998b5a60\") " pod="calico-system/calico-typha-66666f47b7-vq8cq" May 8 00:40:05.047351 kubelet[1956]: I0508 00:40:05.047286 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-cni-net-dir\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047351 kubelet[1956]: I0508 00:40:05.047341 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-lib-modules\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047613 kubelet[1956]: I0508 00:40:05.047360 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-xtables-lock\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047613 kubelet[1956]: I0508 00:40:05.047415 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-var-lib-calico\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047613 kubelet[1956]: I0508 00:40:05.047433 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-cni-bin-dir\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047613 kubelet[1956]: I0508 00:40:05.047452 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-cni-log-dir\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047613 kubelet[1956]: I0508 00:40:05.047469 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-flexvol-driver-host\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047779 kubelet[1956]: I0508 00:40:05.047501 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-policysync\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047779 kubelet[1956]: I0508 00:40:05.047522 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d3fec65a-591d-45b8-930d-9780cc2581cc-tigera-ca-bundle\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047779 kubelet[1956]: I0508 00:40:05.047550 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pqj2g\" (UniqueName: \"kubernetes.io/projected/d3fec65a-591d-45b8-930d-9780cc2581cc-kube-api-access-pqj2g\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047779 kubelet[1956]: I0508 00:40:05.047572 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d3fec65a-591d-45b8-930d-9780cc2581cc-node-certs\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.047779 kubelet[1956]: I0508 00:40:05.047597 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d3fec65a-591d-45b8-930d-9780cc2581cc-var-run-calico\") pod \"calico-node-56rvb\" (UID: \"d3fec65a-591d-45b8-930d-9780cc2581cc\") " pod="calico-system/calico-node-56rvb" May 8 00:40:05.066986 kubelet[1956]: E0508 00:40:05.066848 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:05.148692 kubelet[1956]: I0508 00:40:05.148635 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/59f3f0bd-aa76-43d9-9627-17698227048d-socket-dir\") pod \"csi-node-driver-lxwb2\" (UID: \"59f3f0bd-aa76-43d9-9627-17698227048d\") " pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:05.148913 kubelet[1956]: I0508 00:40:05.148710 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f5tf5\" (UniqueName: \"kubernetes.io/projected/59f3f0bd-aa76-43d9-9627-17698227048d-kube-api-access-f5tf5\") pod \"csi-node-driver-lxwb2\" (UID: \"59f3f0bd-aa76-43d9-9627-17698227048d\") " pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:05.148913 kubelet[1956]: I0508 00:40:05.148738 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/59f3f0bd-aa76-43d9-9627-17698227048d-varrun\") pod \"csi-node-driver-lxwb2\" (UID: \"59f3f0bd-aa76-43d9-9627-17698227048d\") " pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:05.148913 kubelet[1956]: I0508 00:40:05.148768 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/59f3f0bd-aa76-43d9-9627-17698227048d-registration-dir\") pod \"csi-node-driver-lxwb2\" (UID: \"59f3f0bd-aa76-43d9-9627-17698227048d\") " pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:05.148913 kubelet[1956]: I0508 00:40:05.148800 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/59f3f0bd-aa76-43d9-9627-17698227048d-kubelet-dir\") pod \"csi-node-driver-lxwb2\" (UID: \"59f3f0bd-aa76-43d9-9627-17698227048d\") " pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:05.149731 kubelet[1956]: E0508 00:40:05.149679 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.149731 kubelet[1956]: W0508 00:40:05.149711 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.149936 kubelet[1956]: E0508 00:40:05.149764 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.150097 kubelet[1956]: E0508 00:40:05.150058 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.150097 kubelet[1956]: W0508 00:40:05.150074 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.150097 kubelet[1956]: E0508 00:40:05.150096 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.150393 kubelet[1956]: E0508 00:40:05.150369 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.150393 kubelet[1956]: W0508 00:40:05.150387 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.150508 kubelet[1956]: E0508 00:40:05.150485 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.150872 kubelet[1956]: E0508 00:40:05.150854 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.150968 kubelet[1956]: W0508 00:40:05.150947 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.151124 kubelet[1956]: E0508 00:40:05.151097 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.151429 kubelet[1956]: E0508 00:40:05.151403 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.151429 kubelet[1956]: W0508 00:40:05.151420 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.151529 kubelet[1956]: E0508 00:40:05.151470 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.151663 kubelet[1956]: E0508 00:40:05.151643 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.151663 kubelet[1956]: W0508 00:40:05.151659 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.151772 kubelet[1956]: E0508 00:40:05.151693 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.160706 kubelet[1956]: E0508 00:40:05.160446 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.160706 kubelet[1956]: W0508 00:40:05.160466 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.160706 kubelet[1956]: E0508 00:40:05.160518 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.161785 kubelet[1956]: E0508 00:40:05.161766 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.161785 kubelet[1956]: W0508 00:40:05.161781 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.161872 kubelet[1956]: E0508 00:40:05.161819 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.162040 kubelet[1956]: E0508 00:40:05.162008 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.162115 kubelet[1956]: W0508 00:40:05.162042 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.162115 kubelet[1956]: E0508 00:40:05.162081 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.162958 kubelet[1956]: E0508 00:40:05.162791 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.162958 kubelet[1956]: W0508 00:40:05.162805 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.162958 kubelet[1956]: E0508 00:40:05.162831 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163138 kubelet[1956]: E0508 00:40:05.162983 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163138 kubelet[1956]: W0508 00:40:05.162992 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.163138 kubelet[1956]: E0508 00:40:05.163073 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163281 kubelet[1956]: E0508 00:40:05.163259 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163281 kubelet[1956]: W0508 00:40:05.163277 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.163381 kubelet[1956]: E0508 00:40:05.163323 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163478 kubelet[1956]: E0508 00:40:05.163462 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163478 kubelet[1956]: W0508 00:40:05.163473 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.163557 kubelet[1956]: E0508 00:40:05.163526 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163623 kubelet[1956]: E0508 00:40:05.163609 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163623 kubelet[1956]: W0508 00:40:05.163619 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.163690 kubelet[1956]: E0508 00:40:05.163679 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163898 kubelet[1956]: E0508 00:40:05.163754 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163898 kubelet[1956]: W0508 00:40:05.163760 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.163898 kubelet[1956]: E0508 00:40:05.163818 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.163898 kubelet[1956]: E0508 00:40:05.163893 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.163898 kubelet[1956]: W0508 00:40:05.163900 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.164080 kubelet[1956]: E0508 00:40:05.163909 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.164168 kubelet[1956]: E0508 00:40:05.164152 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.164168 kubelet[1956]: W0508 00:40:05.164163 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.164168 kubelet[1956]: E0508 00:40:05.164170 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.164498 kubelet[1956]: E0508 00:40:05.164479 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.164498 kubelet[1956]: W0508 00:40:05.164491 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.164617 kubelet[1956]: E0508 00:40:05.164503 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.164657 kubelet[1956]: E0508 00:40:05.164652 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.164691 kubelet[1956]: W0508 00:40:05.164659 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.164691 kubelet[1956]: E0508 00:40:05.164668 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.164818 kubelet[1956]: E0508 00:40:05.164798 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.164818 kubelet[1956]: W0508 00:40:05.164811 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.164818 kubelet[1956]: E0508 00:40:05.164820 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165007 kubelet[1956]: E0508 00:40:05.164992 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165007 kubelet[1956]: W0508 00:40:05.165002 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165129 kubelet[1956]: E0508 00:40:05.165103 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165164 kubelet[1956]: E0508 00:40:05.165156 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165164 kubelet[1956]: W0508 00:40:05.165162 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165229 kubelet[1956]: E0508 00:40:05.165217 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165285 kubelet[1956]: E0508 00:40:05.165269 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165285 kubelet[1956]: W0508 00:40:05.165280 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165285 kubelet[1956]: E0508 00:40:05.165288 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165457 kubelet[1956]: E0508 00:40:05.165401 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165457 kubelet[1956]: W0508 00:40:05.165407 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165457 kubelet[1956]: E0508 00:40:05.165416 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165558 kubelet[1956]: E0508 00:40:05.165516 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165558 kubelet[1956]: W0508 00:40:05.165522 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165558 kubelet[1956]: E0508 00:40:05.165530 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165679 kubelet[1956]: E0508 00:40:05.165664 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165679 kubelet[1956]: W0508 00:40:05.165675 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165742 kubelet[1956]: E0508 00:40:05.165683 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.165818 kubelet[1956]: E0508 00:40:05.165805 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.165818 kubelet[1956]: W0508 00:40:05.165816 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.165891 kubelet[1956]: E0508 00:40:05.165824 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.166605 kubelet[1956]: E0508 00:40:05.166572 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.166605 kubelet[1956]: W0508 00:40:05.166587 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.166605 kubelet[1956]: E0508 00:40:05.166594 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.193973 kubelet[1956]: E0508 00:40:05.193901 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.194768 env[1200]: time="2025-05-08T00:40:05.194713799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66666f47b7-vq8cq,Uid:fdd0525a-4582-4596-9983-7077998b5a60,Namespace:calico-system,Attempt:0,}" May 8 00:40:05.217713 env[1200]: time="2025-05-08T00:40:05.217621856Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:05.217713 env[1200]: time="2025-05-08T00:40:05.217676749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:05.217713 env[1200]: time="2025-05-08T00:40:05.217691216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:05.219164 env[1200]: time="2025-05-08T00:40:05.217955055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57f5852ffa4fede340ece0005e132df80de73a43b0289617f2f1cbfa4bd23adb pid=2396 runtime=io.containerd.runc.v2 May 8 00:40:05.233678 systemd[1]: Started cri-containerd-57f5852ffa4fede340ece0005e132df80de73a43b0289617f2f1cbfa4bd23adb.scope. May 8 00:40:05.247118 kubelet[1956]: E0508 00:40:05.247074 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.247761 env[1200]: time="2025-05-08T00:40:05.247700929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-56rvb,Uid:d3fec65a-591d-45b8-930d-9780cc2581cc,Namespace:calico-system,Attempt:0,}" May 8 00:40:05.250439 kubelet[1956]: E0508 00:40:05.250399 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.250439 kubelet[1956]: W0508 00:40:05.250437 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.250684 kubelet[1956]: E0508 00:40:05.250467 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.250861 kubelet[1956]: E0508 00:40:05.250815 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.250861 kubelet[1956]: W0508 00:40:05.250832 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.250861 kubelet[1956]: E0508 00:40:05.250850 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.251218 kubelet[1956]: E0508 00:40:05.251137 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.251218 kubelet[1956]: W0508 00:40:05.251155 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.251218 kubelet[1956]: E0508 00:40:05.251177 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.251473 kubelet[1956]: E0508 00:40:05.251445 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.251473 kubelet[1956]: W0508 00:40:05.251465 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.251473 kubelet[1956]: E0508 00:40:05.251476 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.251792 kubelet[1956]: E0508 00:40:05.251764 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.251792 kubelet[1956]: W0508 00:40:05.251783 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.251792 kubelet[1956]: E0508 00:40:05.251794 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.252049 kubelet[1956]: E0508 00:40:05.252012 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.252118 kubelet[1956]: W0508 00:40:05.252057 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.252160 kubelet[1956]: E0508 00:40:05.252131 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.253632 kubelet[1956]: E0508 00:40:05.253599 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.253632 kubelet[1956]: W0508 00:40:05.253617 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.253744 kubelet[1956]: E0508 00:40:05.253675 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.254000 audit: BPF prog-id=118 op=LOAD May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2396 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537663538353266666134666564653334306563653030303565313332 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2396 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537663538353266666134666564653334306563653030303565313332 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit: BPF prog-id=119 op=LOAD May 8 00:40:05.255000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099c30 items=0 ppid=2396 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537663538353266666134666564653334306563653030303565313332 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit: BPF prog-id=120 op=LOAD May 8 00:40:05.255000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099c78 items=0 ppid=2396 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537663538353266666134666564653334306563653030303565313332 May 8 00:40:05.255000 audit: BPF prog-id=120 op=UNLOAD May 8 00:40:05.255000 audit: BPF prog-id=119 op=UNLOAD May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.255000 audit: BPF prog-id=121 op=LOAD May 8 00:40:05.255000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394088 items=0 ppid=2396 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537663538353266666134666564653334306563653030303565313332 May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.255143 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.261787 kubelet[1956]: W0508 00:40:05.255163 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.255300 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.255784 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.261787 kubelet[1956]: W0508 00:40:05.255810 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.256079 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.259209 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.261787 kubelet[1956]: W0508 00:40:05.259224 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.259316 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.261787 kubelet[1956]: E0508 00:40:05.261746 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.262193 kubelet[1956]: W0508 00:40:05.261759 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.263462 kubelet[1956]: E0508 00:40:05.263225 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.263462 kubelet[1956]: E0508 00:40:05.263324 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.263462 kubelet[1956]: W0508 00:40:05.263344 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.263462 kubelet[1956]: E0508 00:40:05.263383 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.263822 kubelet[1956]: E0508 00:40:05.263669 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.263822 kubelet[1956]: W0508 00:40:05.263681 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.263822 kubelet[1956]: E0508 00:40:05.263780 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.264206 kubelet[1956]: E0508 00:40:05.264098 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.264206 kubelet[1956]: W0508 00:40:05.264111 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.264206 kubelet[1956]: E0508 00:40:05.264165 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.264565 kubelet[1956]: E0508 00:40:05.264449 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.264565 kubelet[1956]: W0508 00:40:05.264462 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.264565 kubelet[1956]: E0508 00:40:05.264521 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.265532 kubelet[1956]: E0508 00:40:05.265416 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.265532 kubelet[1956]: W0508 00:40:05.265428 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.265532 kubelet[1956]: E0508 00:40:05.265465 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.265752 kubelet[1956]: E0508 00:40:05.265684 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.265752 kubelet[1956]: W0508 00:40:05.265698 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.265850 kubelet[1956]: E0508 00:40:05.265797 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266310 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267166 kubelet[1956]: W0508 00:40:05.266341 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266372 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266526 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267166 kubelet[1956]: W0508 00:40:05.266545 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266568 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266717 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267166 kubelet[1956]: W0508 00:40:05.266728 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266747 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267166 kubelet[1956]: E0508 00:40:05.266979 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267493 kubelet[1956]: W0508 00:40:05.266989 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267493 kubelet[1956]: E0508 00:40:05.267012 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267493 kubelet[1956]: E0508 00:40:05.267218 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267493 kubelet[1956]: W0508 00:40:05.267229 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267493 kubelet[1956]: E0508 00:40:05.267251 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.267801 kubelet[1956]: E0508 00:40:05.267779 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.267865 kubelet[1956]: W0508 00:40:05.267795 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.267865 kubelet[1956]: E0508 00:40:05.267823 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.268478 kubelet[1956]: E0508 00:40:05.268291 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.268478 kubelet[1956]: W0508 00:40:05.268305 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.268478 kubelet[1956]: E0508 00:40:05.268323 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.268707 kubelet[1956]: E0508 00:40:05.268660 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.268707 kubelet[1956]: W0508 00:40:05.268671 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.268707 kubelet[1956]: E0508 00:40:05.268682 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.279142 kubelet[1956]: E0508 00:40:05.278623 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.279142 kubelet[1956]: W0508 00:40:05.278689 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.279142 kubelet[1956]: E0508 00:40:05.278750 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.290476 env[1200]: time="2025-05-08T00:40:05.290436235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66666f47b7-vq8cq,Uid:fdd0525a-4582-4596-9983-7077998b5a60,Namespace:calico-system,Attempt:0,} returns sandbox id \"57f5852ffa4fede340ece0005e132df80de73a43b0289617f2f1cbfa4bd23adb\"" May 8 00:40:05.291436 kubelet[1956]: E0508 00:40:05.291399 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.292441 env[1200]: time="2025-05-08T00:40:05.292328748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:40:05.513806 kubelet[1956]: E0508 00:40:05.513655 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.518401 kubelet[1956]: E0508 00:40:05.518257 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.518401 kubelet[1956]: W0508 00:40:05.518279 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.518401 kubelet[1956]: E0508 00:40:05.518314 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.518750 kubelet[1956]: E0508 00:40:05.518699 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.518750 kubelet[1956]: W0508 00:40:05.518723 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.518750 kubelet[1956]: E0508 00:40:05.518735 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.519046 kubelet[1956]: E0508 00:40:05.518943 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.519046 kubelet[1956]: W0508 00:40:05.518950 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.519046 kubelet[1956]: E0508 00:40:05.518957 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.519238 kubelet[1956]: E0508 00:40:05.519218 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.519238 kubelet[1956]: W0508 00:40:05.519232 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.519329 kubelet[1956]: E0508 00:40:05.519243 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.519505 kubelet[1956]: E0508 00:40:05.519474 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.519505 kubelet[1956]: W0508 00:40:05.519490 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.519505 kubelet[1956]: E0508 00:40:05.519499 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.712331 env[1200]: time="2025-05-08T00:40:05.712214089Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:05.712331 env[1200]: time="2025-05-08T00:40:05.712278792Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:05.712598 env[1200]: time="2025-05-08T00:40:05.712337463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:05.712793 env[1200]: time="2025-05-08T00:40:05.712682444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b pid=2470 runtime=io.containerd.runc.v2 May 8 00:40:05.726652 systemd[1]: Started cri-containerd-253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b.scope. May 8 00:40:05.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit: BPF prog-id=122 op=LOAD May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333131396336396366633836663632393663653933623430656336 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333131396336396366633836663632393663653933623430656336 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.738000 audit: BPF prog-id=123 op=LOAD May 8 00:40:05.738000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009bdb0 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333131396336396366633836663632393663653933623430656336 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit: BPF prog-id=124 op=LOAD May 8 00:40:05.739000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009bdf8 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333131396336396366633836663632393663653933623430656336 May 8 00:40:05.739000 audit: BPF prog-id=124 op=UNLOAD May 8 00:40:05.739000 audit: BPF prog-id=123 op=UNLOAD May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:05.739000 audit: BPF prog-id=125 op=LOAD May 8 00:40:05.739000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000416208 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333131396336396366633836663632393663653933623430656336 May 8 00:40:05.756861 env[1200]: time="2025-05-08T00:40:05.756808124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-56rvb,Uid:d3fec65a-591d-45b8-930d-9780cc2581cc,Namespace:calico-system,Attempt:0,} returns sandbox id \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\"" May 8 00:40:05.757853 kubelet[1956]: E0508 00:40:05.757828 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.856000 audit[2507]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:05.856000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc728128b0 a2=0 a3=7ffc7281289c items=0 ppid=2148 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:05.863000 audit[2507]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:05.863000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc728128b0 a2=0 a3=0 items=0 ppid=2148 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:05.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:05.890167 kubelet[1956]: E0508 00:40:05.890130 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:05.922476 kubelet[1956]: E0508 00:40:05.922420 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.922476 kubelet[1956]: W0508 00:40:05.922452 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.922476 kubelet[1956]: E0508 00:40:05.922476 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.922753 kubelet[1956]: E0508 00:40:05.922666 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.922753 kubelet[1956]: W0508 00:40:05.922675 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.922753 kubelet[1956]: E0508 00:40:05.922684 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.922888 kubelet[1956]: E0508 00:40:05.922866 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.922888 kubelet[1956]: W0508 00:40:05.922879 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.922942 kubelet[1956]: E0508 00:40:05.922888 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.923116 kubelet[1956]: E0508 00:40:05.923092 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.923116 kubelet[1956]: W0508 00:40:05.923105 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.923116 kubelet[1956]: E0508 00:40:05.923115 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:05.923326 kubelet[1956]: E0508 00:40:05.923303 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:05.923326 kubelet[1956]: W0508 00:40:05.923316 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:05.923326 kubelet[1956]: E0508 00:40:05.923325 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:06.850400 kubelet[1956]: E0508 00:40:06.850336 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:08.850605 kubelet[1956]: E0508 00:40:08.850514 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:10.374878 env[1200]: time="2025-05-08T00:40:10.374811092Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:10.465930 env[1200]: time="2025-05-08T00:40:10.465865802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:10.504406 env[1200]: time="2025-05-08T00:40:10.504329966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:10.602967 env[1200]: time="2025-05-08T00:40:10.602905379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:10.603748 env[1200]: time="2025-05-08T00:40:10.603709645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 8 00:40:10.605119 env[1200]: time="2025-05-08T00:40:10.605052435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:40:10.614268 env[1200]: time="2025-05-08T00:40:10.614212567Z" level=info msg="CreateContainer within sandbox \"57f5852ffa4fede340ece0005e132df80de73a43b0289617f2f1cbfa4bd23adb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:40:10.723359 env[1200]: time="2025-05-08T00:40:10.723201593Z" level=info msg="CreateContainer within sandbox \"57f5852ffa4fede340ece0005e132df80de73a43b0289617f2f1cbfa4bd23adb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0be9b2e78eee83a8db1cb6e2b990fc8cf7c9d62dab9121c35f1386817d6d4357\"" May 8 00:40:10.724145 env[1200]: time="2025-05-08T00:40:10.724107170Z" level=info msg="StartContainer for \"0be9b2e78eee83a8db1cb6e2b990fc8cf7c9d62dab9121c35f1386817d6d4357\"" May 8 00:40:10.743156 systemd[1]: Started cri-containerd-0be9b2e78eee83a8db1cb6e2b990fc8cf7c9d62dab9121c35f1386817d6d4357.scope. May 8 00:40:10.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.758282 kernel: kauditd_printk_skb: 122 callbacks suppressed May 8 00:40:10.758358 kernel: audit: type=1400 audit(1746664810.756:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.764737 kernel: audit: type=1400 audit(1746664810.756:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.764788 kernel: audit: type=1400 audit(1746664810.756:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.771593 kernel: audit: type=1400 audit(1746664810.756:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.775379 kernel: audit: type=1400 audit(1746664810.756:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.775479 kernel: audit: type=1400 audit(1746664810.756:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.783050 kernel: audit: type=1400 audit(1746664810.756:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.783188 kernel: audit: type=1400 audit(1746664810.756:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.790183 kernel: audit: type=1400 audit(1746664810.756:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.794144 kernel: audit: type=1400 audit(1746664810.760:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.760000 audit: BPF prog-id=126 op=LOAD May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2396 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:10.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653962326537386565653833613864623163623665326239393066 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2396 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:10.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653962326537386565653833613864623163623665326239393066 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.761000 audit: BPF prog-id=127 op=LOAD May 8 00:40:10.761000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261d10 items=0 ppid=2396 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:10.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653962326537386565653833613864623163623665326239393066 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.763000 audit: BPF prog-id=128 op=LOAD May 8 00:40:10.763000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261d58 items=0 ppid=2396 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:10.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653962326537386565653833613864623163623665326239393066 May 8 00:40:10.770000 audit: BPF prog-id=128 op=UNLOAD May 8 00:40:10.770000 audit: BPF prog-id=127 op=UNLOAD May 8 00:40:10.770000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { perfmon } for pid=2522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit[2522]: AVC avc: denied { bpf } for pid=2522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:10.770000 audit: BPF prog-id=129 op=LOAD May 8 00:40:10.770000 audit[2522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000448168 items=0 ppid=2396 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:10.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653962326537386565653833613864623163623665326239393066 May 8 00:40:10.817157 env[1200]: time="2025-05-08T00:40:10.817017256Z" level=info msg="StartContainer for \"0be9b2e78eee83a8db1cb6e2b990fc8cf7c9d62dab9121c35f1386817d6d4357\" returns successfully" May 8 00:40:10.849858 kubelet[1956]: E0508 00:40:10.849779 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:10.899623 kubelet[1956]: E0508 00:40:10.899571 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:10.926839 kubelet[1956]: I0508 00:40:10.926743 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-66666f47b7-vq8cq" podStartSLOduration=1.6139089439999998 podStartE2EDuration="6.926722162s" podCreationTimestamp="2025-05-08 00:40:04 +0000 UTC" firstStartedPulling="2025-05-08 00:40:05.292035123 +0000 UTC m=+13.541875938" lastFinishedPulling="2025-05-08 00:40:10.60484834 +0000 UTC m=+18.854689156" observedRunningTime="2025-05-08 00:40:10.925993138 +0000 UTC m=+19.175833953" watchObservedRunningTime="2025-05-08 00:40:10.926722162 +0000 UTC m=+19.176562988" May 8 00:40:10.957904 kubelet[1956]: E0508 00:40:10.957843 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.957904 kubelet[1956]: W0508 00:40:10.957886 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.957904 kubelet[1956]: E0508 00:40:10.957916 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.960125 kubelet[1956]: E0508 00:40:10.960098 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.960125 kubelet[1956]: W0508 00:40:10.960120 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.960216 kubelet[1956]: E0508 00:40:10.960133 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.963145 kubelet[1956]: E0508 00:40:10.963103 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.963145 kubelet[1956]: W0508 00:40:10.963126 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.963145 kubelet[1956]: E0508 00:40:10.963139 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.966058 kubelet[1956]: E0508 00:40:10.966012 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.966058 kubelet[1956]: W0508 00:40:10.966057 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.966150 kubelet[1956]: E0508 00:40:10.966071 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.966344 kubelet[1956]: E0508 00:40:10.966312 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.966344 kubelet[1956]: W0508 00:40:10.966333 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.966344 kubelet[1956]: E0508 00:40:10.966345 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.966633 kubelet[1956]: E0508 00:40:10.966599 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.966633 kubelet[1956]: W0508 00:40:10.966619 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.966633 kubelet[1956]: E0508 00:40:10.966630 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.966934 kubelet[1956]: E0508 00:40:10.966910 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.966934 kubelet[1956]: W0508 00:40:10.966922 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.966934 kubelet[1956]: E0508 00:40:10.966932 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.967520 kubelet[1956]: E0508 00:40:10.967496 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.967520 kubelet[1956]: W0508 00:40:10.967512 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.967520 kubelet[1956]: E0508 00:40:10.967522 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.968493 kubelet[1956]: E0508 00:40:10.968465 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.968493 kubelet[1956]: W0508 00:40:10.968486 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.968593 kubelet[1956]: E0508 00:40:10.968499 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.970752 kubelet[1956]: E0508 00:40:10.970725 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.970752 kubelet[1956]: W0508 00:40:10.970744 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.970832 kubelet[1956]: E0508 00:40:10.970756 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.974192 kubelet[1956]: E0508 00:40:10.974104 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.974192 kubelet[1956]: W0508 00:40:10.974129 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.974192 kubelet[1956]: E0508 00:40:10.974142 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975186 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.976141 kubelet[1956]: W0508 00:40:10.975215 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975254 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975685 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.976141 kubelet[1956]: W0508 00:40:10.975695 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975705 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975886 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.976141 kubelet[1956]: W0508 00:40:10.975899 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.975912 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.976141 kubelet[1956]: E0508 00:40:10.976106 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.976469 kubelet[1956]: W0508 00:40:10.976131 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.976469 kubelet[1956]: E0508 00:40:10.976142 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.997804 kubelet[1956]: E0508 00:40:10.997708 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.997804 kubelet[1956]: W0508 00:40:10.997743 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.997804 kubelet[1956]: E0508 00:40:10.997774 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.998156 kubelet[1956]: E0508 00:40:10.998111 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.998205 kubelet[1956]: W0508 00:40:10.998152 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.998205 kubelet[1956]: E0508 00:40:10.998191 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.998532 kubelet[1956]: E0508 00:40:10.998508 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.998532 kubelet[1956]: W0508 00:40:10.998521 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.998532 kubelet[1956]: E0508 00:40:10.998534 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.998802 kubelet[1956]: E0508 00:40:10.998778 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.998802 kubelet[1956]: W0508 00:40:10.998795 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.998890 kubelet[1956]: E0508 00:40:10.998809 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.999047 kubelet[1956]: E0508 00:40:10.999009 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.999047 kubelet[1956]: W0508 00:40:10.999042 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.999134 kubelet[1956]: E0508 00:40:10.999059 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.999241 kubelet[1956]: E0508 00:40:10.999217 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.999241 kubelet[1956]: W0508 00:40:10.999234 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.999320 kubelet[1956]: E0508 00:40:10.999281 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.999393 kubelet[1956]: E0508 00:40:10.999372 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.999393 kubelet[1956]: W0508 00:40:10.999385 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.999479 kubelet[1956]: E0508 00:40:10.999414 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.999546 kubelet[1956]: E0508 00:40:10.999525 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.999546 kubelet[1956]: W0508 00:40:10.999538 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.999624 kubelet[1956]: E0508 00:40:10.999566 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:10.999740 kubelet[1956]: E0508 00:40:10.999718 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:10.999740 kubelet[1956]: W0508 00:40:10.999731 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:10.999740 kubelet[1956]: E0508 00:40:10.999743 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.000120 kubelet[1956]: E0508 00:40:11.000098 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.000120 kubelet[1956]: W0508 00:40:11.000114 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.000198 kubelet[1956]: E0508 00:40:11.000125 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.000309 kubelet[1956]: E0508 00:40:11.000288 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.000309 kubelet[1956]: W0508 00:40:11.000301 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.000309 kubelet[1956]: E0508 00:40:11.000311 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.000475 kubelet[1956]: E0508 00:40:11.000456 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.000475 kubelet[1956]: W0508 00:40:11.000468 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.000475 kubelet[1956]: E0508 00:40:11.000475 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.000666 kubelet[1956]: E0508 00:40:11.000645 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.000666 kubelet[1956]: W0508 00:40:11.000657 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.000666 kubelet[1956]: E0508 00:40:11.000667 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.001132 kubelet[1956]: E0508 00:40:11.001108 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.001132 kubelet[1956]: W0508 00:40:11.001127 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.001209 kubelet[1956]: E0508 00:40:11.001202 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.001298 kubelet[1956]: E0508 00:40:11.001278 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.001298 kubelet[1956]: W0508 00:40:11.001290 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.001298 kubelet[1956]: E0508 00:40:11.001299 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.001469 kubelet[1956]: E0508 00:40:11.001450 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.001469 kubelet[1956]: W0508 00:40:11.001462 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.001469 kubelet[1956]: E0508 00:40:11.001470 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.001668 kubelet[1956]: E0508 00:40:11.001648 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.001668 kubelet[1956]: W0508 00:40:11.001660 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.001668 kubelet[1956]: E0508 00:40:11.001667 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.001987 kubelet[1956]: E0508 00:40:11.001966 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.001987 kubelet[1956]: W0508 00:40:11.001980 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.001987 kubelet[1956]: E0508 00:40:11.001987 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.904218 kubelet[1956]: E0508 00:40:11.904158 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:11.983979 kubelet[1956]: E0508 00:40:11.983936 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.983979 kubelet[1956]: W0508 00:40:11.983964 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.983979 kubelet[1956]: E0508 00:40:11.983986 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.984319 kubelet[1956]: E0508 00:40:11.984172 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.984319 kubelet[1956]: W0508 00:40:11.984179 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.984319 kubelet[1956]: E0508 00:40:11.984186 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.984319 kubelet[1956]: E0508 00:40:11.984315 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.984319 kubelet[1956]: W0508 00:40:11.984321 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.984498 kubelet[1956]: E0508 00:40:11.984330 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.984580 kubelet[1956]: E0508 00:40:11.984557 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.984580 kubelet[1956]: W0508 00:40:11.984571 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.984580 kubelet[1956]: E0508 00:40:11.984579 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.984755 kubelet[1956]: E0508 00:40:11.984734 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.984755 kubelet[1956]: W0508 00:40:11.984747 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.984830 kubelet[1956]: E0508 00:40:11.984757 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.984936 kubelet[1956]: E0508 00:40:11.984913 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.984936 kubelet[1956]: W0508 00:40:11.984929 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985014 kubelet[1956]: E0508 00:40:11.984939 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985117 kubelet[1956]: E0508 00:40:11.985104 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985117 kubelet[1956]: W0508 00:40:11.985114 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985202 kubelet[1956]: E0508 00:40:11.985121 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985267 kubelet[1956]: E0508 00:40:11.985256 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985267 kubelet[1956]: W0508 00:40:11.985264 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985441 kubelet[1956]: E0508 00:40:11.985270 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985441 kubelet[1956]: E0508 00:40:11.985428 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985441 kubelet[1956]: W0508 00:40:11.985437 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985553 kubelet[1956]: E0508 00:40:11.985446 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985609 kubelet[1956]: E0508 00:40:11.985597 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985609 kubelet[1956]: W0508 00:40:11.985607 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985678 kubelet[1956]: E0508 00:40:11.985615 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985772 kubelet[1956]: E0508 00:40:11.985760 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985772 kubelet[1956]: W0508 00:40:11.985769 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985907 kubelet[1956]: E0508 00:40:11.985776 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.985950 kubelet[1956]: E0508 00:40:11.985911 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.985950 kubelet[1956]: W0508 00:40:11.985920 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.985950 kubelet[1956]: E0508 00:40:11.985928 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.986122 kubelet[1956]: E0508 00:40:11.986108 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.986122 kubelet[1956]: W0508 00:40:11.986120 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.986203 kubelet[1956]: E0508 00:40:11.986129 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.986301 kubelet[1956]: E0508 00:40:11.986288 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.986342 kubelet[1956]: W0508 00:40:11.986302 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.986342 kubelet[1956]: E0508 00:40:11.986316 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:11.986512 kubelet[1956]: E0508 00:40:11.986484 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:11.986512 kubelet[1956]: W0508 00:40:11.986503 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:11.986587 kubelet[1956]: E0508 00:40:11.986515 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.004278 kubelet[1956]: E0508 00:40:12.004247 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.004278 kubelet[1956]: W0508 00:40:12.004268 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.004462 kubelet[1956]: E0508 00:40:12.004289 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.004587 kubelet[1956]: E0508 00:40:12.004574 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.004587 kubelet[1956]: W0508 00:40:12.004585 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.004680 kubelet[1956]: E0508 00:40:12.004601 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.004838 kubelet[1956]: E0508 00:40:12.004813 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.004892 kubelet[1956]: W0508 00:40:12.004838 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.004892 kubelet[1956]: E0508 00:40:12.004865 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.005181 kubelet[1956]: E0508 00:40:12.005154 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.005181 kubelet[1956]: W0508 00:40:12.005179 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.005264 kubelet[1956]: E0508 00:40:12.005205 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.005465 kubelet[1956]: E0508 00:40:12.005428 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.005465 kubelet[1956]: W0508 00:40:12.005444 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.005465 kubelet[1956]: E0508 00:40:12.005463 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.005703 kubelet[1956]: E0508 00:40:12.005610 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.005703 kubelet[1956]: W0508 00:40:12.005620 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.005703 kubelet[1956]: E0508 00:40:12.005635 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.005844 kubelet[1956]: E0508 00:40:12.005825 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.005844 kubelet[1956]: W0508 00:40:12.005837 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.005937 kubelet[1956]: E0508 00:40:12.005868 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.006078 kubelet[1956]: E0508 00:40:12.006062 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.006078 kubelet[1956]: W0508 00:40:12.006074 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.006167 kubelet[1956]: E0508 00:40:12.006107 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.006273 kubelet[1956]: E0508 00:40:12.006254 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.006273 kubelet[1956]: W0508 00:40:12.006267 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.006361 kubelet[1956]: E0508 00:40:12.006284 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.006512 kubelet[1956]: E0508 00:40:12.006499 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.006512 kubelet[1956]: W0508 00:40:12.006510 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.006572 kubelet[1956]: E0508 00:40:12.006523 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.006695 kubelet[1956]: E0508 00:40:12.006686 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.006723 kubelet[1956]: W0508 00:40:12.006695 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.006723 kubelet[1956]: E0508 00:40:12.006707 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.006883 kubelet[1956]: E0508 00:40:12.006874 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.006883 kubelet[1956]: W0508 00:40:12.006882 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.006940 kubelet[1956]: E0508 00:40:12.006894 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.007172 kubelet[1956]: E0508 00:40:12.007153 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.007172 kubelet[1956]: W0508 00:40:12.007169 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.007250 kubelet[1956]: E0508 00:40:12.007185 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.007400 kubelet[1956]: E0508 00:40:12.007384 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.007400 kubelet[1956]: W0508 00:40:12.007395 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.007476 kubelet[1956]: E0508 00:40:12.007408 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.007625 kubelet[1956]: E0508 00:40:12.007612 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.007625 kubelet[1956]: W0508 00:40:12.007622 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.007683 kubelet[1956]: E0508 00:40:12.007634 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.007905 kubelet[1956]: E0508 00:40:12.007884 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.007905 kubelet[1956]: W0508 00:40:12.007901 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.007970 kubelet[1956]: E0508 00:40:12.007920 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.008135 kubelet[1956]: E0508 00:40:12.008124 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.008172 kubelet[1956]: W0508 00:40:12.008136 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.008172 kubelet[1956]: E0508 00:40:12.008150 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.008353 kubelet[1956]: E0508 00:40:12.008338 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.008389 kubelet[1956]: W0508 00:40:12.008353 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.008389 kubelet[1956]: E0508 00:40:12.008364 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.416000 audit[2622]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:12.416000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc76cc4f70 a2=0 a3=7ffc76cc4f5c items=0 ppid=2148 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:12.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:12.419000 audit[2622]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:12.419000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc76cc4f70 a2=0 a3=7ffc76cc4f5c items=0 ppid=2148 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:12.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:12.850075 kubelet[1956]: E0508 00:40:12.849887 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:12.904700 kubelet[1956]: E0508 00:40:12.904659 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:12.992296 kubelet[1956]: E0508 00:40:12.992245 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.992296 kubelet[1956]: W0508 00:40:12.992280 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.992296 kubelet[1956]: E0508 00:40:12.992306 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.992552 kubelet[1956]: E0508 00:40:12.992530 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.992552 kubelet[1956]: W0508 00:40:12.992543 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.992552 kubelet[1956]: E0508 00:40:12.992552 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.992768 kubelet[1956]: E0508 00:40:12.992749 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.992768 kubelet[1956]: W0508 00:40:12.992761 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.992768 kubelet[1956]: E0508 00:40:12.992768 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.992969 kubelet[1956]: E0508 00:40:12.992950 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.992969 kubelet[1956]: W0508 00:40:12.992962 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.992969 kubelet[1956]: E0508 00:40:12.992969 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.993267 kubelet[1956]: E0508 00:40:12.993241 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.993320 kubelet[1956]: W0508 00:40:12.993266 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.993320 kubelet[1956]: E0508 00:40:12.993290 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.993533 kubelet[1956]: E0508 00:40:12.993520 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.993533 kubelet[1956]: W0508 00:40:12.993529 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.993620 kubelet[1956]: E0508 00:40:12.993536 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.993739 kubelet[1956]: E0508 00:40:12.993721 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.993739 kubelet[1956]: W0508 00:40:12.993731 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.993739 kubelet[1956]: E0508 00:40:12.993739 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.993948 kubelet[1956]: E0508 00:40:12.993927 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.993948 kubelet[1956]: W0508 00:40:12.993943 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.994047 kubelet[1956]: E0508 00:40:12.993957 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.994237 kubelet[1956]: E0508 00:40:12.994217 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.994237 kubelet[1956]: W0508 00:40:12.994232 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.994330 kubelet[1956]: E0508 00:40:12.994243 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.994482 kubelet[1956]: E0508 00:40:12.994465 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.994519 kubelet[1956]: W0508 00:40:12.994482 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.994519 kubelet[1956]: E0508 00:40:12.994494 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.994717 kubelet[1956]: E0508 00:40:12.994699 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.994717 kubelet[1956]: W0508 00:40:12.994712 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.994818 kubelet[1956]: E0508 00:40:12.994722 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.994953 kubelet[1956]: E0508 00:40:12.994934 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.994953 kubelet[1956]: W0508 00:40:12.994950 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.995084 kubelet[1956]: E0508 00:40:12.994962 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.995217 kubelet[1956]: E0508 00:40:12.995204 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.995217 kubelet[1956]: W0508 00:40:12.995215 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.995274 kubelet[1956]: E0508 00:40:12.995225 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.995442 kubelet[1956]: E0508 00:40:12.995427 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.995442 kubelet[1956]: W0508 00:40:12.995438 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.995522 kubelet[1956]: E0508 00:40:12.995447 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:12.995702 kubelet[1956]: E0508 00:40:12.995660 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:12.995702 kubelet[1956]: W0508 00:40:12.995673 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:12.995702 kubelet[1956]: E0508 00:40:12.995685 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.011266 kubelet[1956]: E0508 00:40:13.011209 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.011266 kubelet[1956]: W0508 00:40:13.011237 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.011266 kubelet[1956]: E0508 00:40:13.011257 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.011522 kubelet[1956]: E0508 00:40:13.011443 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.011522 kubelet[1956]: W0508 00:40:13.011450 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.011522 kubelet[1956]: E0508 00:40:13.011462 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.011800 kubelet[1956]: E0508 00:40:13.011759 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.011800 kubelet[1956]: W0508 00:40:13.011791 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.011864 kubelet[1956]: E0508 00:40:13.011819 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.011992 kubelet[1956]: E0508 00:40:13.011975 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.011992 kubelet[1956]: W0508 00:40:13.011986 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.012090 kubelet[1956]: E0508 00:40:13.011999 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.012178 kubelet[1956]: E0508 00:40:13.012159 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.012178 kubelet[1956]: W0508 00:40:13.012172 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.012231 kubelet[1956]: E0508 00:40:13.012183 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.012407 kubelet[1956]: E0508 00:40:13.012375 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.012407 kubelet[1956]: W0508 00:40:13.012391 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.012473 kubelet[1956]: E0508 00:40:13.012414 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.012763 kubelet[1956]: E0508 00:40:13.012741 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.012763 kubelet[1956]: W0508 00:40:13.012761 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.012853 kubelet[1956]: E0508 00:40:13.012779 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.012997 kubelet[1956]: E0508 00:40:13.012985 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.013041 kubelet[1956]: W0508 00:40:13.012996 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.013117 kubelet[1956]: E0508 00:40:13.013082 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.013233 kubelet[1956]: E0508 00:40:13.013220 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.013262 kubelet[1956]: W0508 00:40:13.013233 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.013292 kubelet[1956]: E0508 00:40:13.013268 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.013478 kubelet[1956]: E0508 00:40:13.013457 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.013478 kubelet[1956]: W0508 00:40:13.013472 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.013578 kubelet[1956]: E0508 00:40:13.013492 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.013688 kubelet[1956]: E0508 00:40:13.013676 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.013688 kubelet[1956]: W0508 00:40:13.013685 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.013743 kubelet[1956]: E0508 00:40:13.013697 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.013857 kubelet[1956]: E0508 00:40:13.013845 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.013857 kubelet[1956]: W0508 00:40:13.013853 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.013933 kubelet[1956]: E0508 00:40:13.013864 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.014115 kubelet[1956]: E0508 00:40:13.014105 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.014115 kubelet[1956]: W0508 00:40:13.014114 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.014175 kubelet[1956]: E0508 00:40:13.014129 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.014425 kubelet[1956]: E0508 00:40:13.014408 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.014425 kubelet[1956]: W0508 00:40:13.014422 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.014501 kubelet[1956]: E0508 00:40:13.014435 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.014604 kubelet[1956]: E0508 00:40:13.014591 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.014604 kubelet[1956]: W0508 00:40:13.014601 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.014655 kubelet[1956]: E0508 00:40:13.014608 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.014817 kubelet[1956]: E0508 00:40:13.014804 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.014817 kubelet[1956]: W0508 00:40:13.014814 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.014918 kubelet[1956]: E0508 00:40:13.014822 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.015050 kubelet[1956]: E0508 00:40:13.015020 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.015085 kubelet[1956]: W0508 00:40:13.015048 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.015085 kubelet[1956]: E0508 00:40:13.015064 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:13.015238 kubelet[1956]: E0508 00:40:13.015225 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:13.015238 kubelet[1956]: W0508 00:40:13.015236 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:13.015291 kubelet[1956]: E0508 00:40:13.015244 1956 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:14.631838 env[1200]: time="2025-05-08T00:40:14.631750013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:14.638112 env[1200]: time="2025-05-08T00:40:14.638012842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:14.640832 env[1200]: time="2025-05-08T00:40:14.640796813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:14.642843 env[1200]: time="2025-05-08T00:40:14.642792961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:14.643304 env[1200]: time="2025-05-08T00:40:14.643244581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 8 00:40:14.645519 env[1200]: time="2025-05-08T00:40:14.645475240Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:40:14.671452 env[1200]: time="2025-05-08T00:40:14.671357643Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d\"" May 8 00:40:14.672060 env[1200]: time="2025-05-08T00:40:14.672012346Z" level=info msg="StartContainer for \"306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d\"" May 8 00:40:14.696893 systemd[1]: Started cri-containerd-306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d.scope. May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fec58c1ecc8 items=0 ppid=2470 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:14.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366631346538336439373739383239623465323365366131363435 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit: BPF prog-id=130 op=LOAD May 8 00:40:14.715000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000399fb8 items=0 ppid=2470 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:14.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366631346538336439373739383239623465323365366131363435 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit: BPF prog-id=131 op=LOAD May 8 00:40:14.715000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f0008 items=0 ppid=2470 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:14.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366631346538336439373739383239623465323365366131363435 May 8 00:40:14.715000 audit: BPF prog-id=131 op=UNLOAD May 8 00:40:14.715000 audit: BPF prog-id=130 op=UNLOAD May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:14.715000 audit: BPF prog-id=132 op=LOAD May 8 00:40:14.715000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f0098 items=0 ppid=2470 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:14.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366631346538336439373739383239623465323365366131363435 May 8 00:40:14.745881 systemd[1]: cri-containerd-306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d.scope: Deactivated successfully. May 8 00:40:14.749000 audit: BPF prog-id=132 op=UNLOAD May 8 00:40:14.754837 env[1200]: time="2025-05-08T00:40:14.754759867Z" level=info msg="StartContainer for \"306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d\" returns successfully" May 8 00:40:14.779344 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d-rootfs.mount: Deactivated successfully. May 8 00:40:14.801811 env[1200]: time="2025-05-08T00:40:14.801743041Z" level=info msg="shim disconnected" id=306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d May 8 00:40:14.801811 env[1200]: time="2025-05-08T00:40:14.801801381Z" level=warning msg="cleaning up after shim disconnected" id=306f14e83d9779829b4e23e6a1645e5212710786c22be1ae8d36f3edc1e4990d namespace=k8s.io May 8 00:40:14.801811 env[1200]: time="2025-05-08T00:40:14.801811449Z" level=info msg="cleaning up dead shim" May 8 00:40:14.809474 env[1200]: time="2025-05-08T00:40:14.809409874Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:40:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2704 runtime=io.containerd.runc.v2\n" May 8 00:40:14.849692 kubelet[1956]: E0508 00:40:14.849612 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:14.909106 kubelet[1956]: E0508 00:40:14.908987 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:14.909745 env[1200]: time="2025-05-08T00:40:14.909716179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:40:16.850008 kubelet[1956]: E0508 00:40:16.849937 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:18.850235 kubelet[1956]: E0508 00:40:18.850154 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:20.849967 kubelet[1956]: E0508 00:40:20.849899 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:22.850474 kubelet[1956]: E0508 00:40:22.850379 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:24.850510 kubelet[1956]: E0508 00:40:24.850419 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:26.849630 kubelet[1956]: E0508 00:40:26.849576 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:26.968468 env[1200]: time="2025-05-08T00:40:26.968364289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:27.093406 env[1200]: time="2025-05-08T00:40:27.093334089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:27.129002 env[1200]: time="2025-05-08T00:40:27.128850711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:27.165623 env[1200]: time="2025-05-08T00:40:27.165555155Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:27.166172 env[1200]: time="2025-05-08T00:40:27.166144453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 8 00:40:27.168012 env[1200]: time="2025-05-08T00:40:27.167972857Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:40:27.351423 env[1200]: time="2025-05-08T00:40:27.351341260Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f\"" May 8 00:40:27.351949 env[1200]: time="2025-05-08T00:40:27.351899730Z" level=info msg="StartContainer for \"01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f\"" May 8 00:40:27.375312 systemd[1]: run-containerd-runc-k8s.io-01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f-runc.9uf6Uk.mount: Deactivated successfully. May 8 00:40:27.376926 systemd[1]: Started cri-containerd-01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f.scope. May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.424308 kernel: kauditd_printk_skb: 97 callbacks suppressed May 8 00:40:27.424522 kernel: audit: type=1400 audit(1746664827.397:996): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.424554 kernel: audit: type=1300 audit(1746664827.397:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa94fc52a88 items=0 ppid=2470 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:27.424589 kernel: audit: type=1327 audit(1746664827.397:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373532653831666530386465633237373931303236333636643234 May 8 00:40:27.424609 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.424629 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.424644 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa94fc52a88 items=0 ppid=2470 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:27.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373532653831666530386465633237373931303236333636643234 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.429137 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.436425 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.436574 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.436595 kernel: audit: type=1400 audit(1746664827.397:997): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.397000 audit: BPF prog-id=133 op=LOAD May 8 00:40:27.397000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a2578 items=0 ppid=2470 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:27.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373532653831666530386465633237373931303236333636643234 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.401000 audit: BPF prog-id=134 op=LOAD May 8 00:40:27.401000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a25c8 items=0 ppid=2470 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:27.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373532653831666530386465633237373931303236333636643234 May 8 00:40:27.407000 audit: BPF prog-id=134 op=UNLOAD May 8 00:40:27.407000 audit: BPF prog-id=133 op=UNLOAD May 8 00:40:27.407000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:27.407000 audit: BPF prog-id=135 op=LOAD May 8 00:40:27.407000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a2658 items=0 ppid=2470 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:27.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373532653831666530386465633237373931303236333636643234 May 8 00:40:27.779579 env[1200]: time="2025-05-08T00:40:27.779433340Z" level=info msg="StartContainer for \"01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f\" returns successfully" May 8 00:40:28.038217 kubelet[1956]: E0508 00:40:28.038158 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:28.849766 kubelet[1956]: E0508 00:40:28.849691 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:29.039525 kubelet[1956]: E0508 00:40:29.039488 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:30.850219 kubelet[1956]: E0508 00:40:30.850156 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:32.850153 kubelet[1956]: E0508 00:40:32.850097 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:33.456361 systemd[1]: cri-containerd-01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f.scope: Deactivated successfully. May 8 00:40:33.462000 audit: BPF prog-id=135 op=UNLOAD May 8 00:40:33.473690 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f-rootfs.mount: Deactivated successfully. May 8 00:40:33.493320 kubelet[1956]: I0508 00:40:33.493291 1956 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 8 00:40:33.524224 kernel: kauditd_printk_skb: 33 callbacks suppressed May 8 00:40:33.524525 kernel: audit: type=1334 audit(1746664833.462:1002): prog-id=135 op=UNLOAD May 8 00:40:34.048706 env[1200]: time="2025-05-08T00:40:34.048646809Z" level=info msg="shim disconnected" id=01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f May 8 00:40:34.048706 env[1200]: time="2025-05-08T00:40:34.048698235Z" level=warning msg="cleaning up after shim disconnected" id=01752e81fe08dec27791026366d2409dc2cc01b4a97f72cc49b7813a6654817f namespace=k8s.io May 8 00:40:34.048706 env[1200]: time="2025-05-08T00:40:34.048707843Z" level=info msg="cleaning up dead shim" May 8 00:40:34.055194 env[1200]: time="2025-05-08T00:40:34.055161701Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:40:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2777 runtime=io.containerd.runc.v2\n" May 8 00:40:34.177361 systemd[1]: Created slice kubepods-besteffort-pod57afaea9_3e1b_43e3_9dd7_fb7e57a9a47d.slice. May 8 00:40:34.185488 kubelet[1956]: I0508 00:40:34.185328 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a54d3460-718f-4407-98c3-b431319cb589-config-volume\") pod \"coredns-668d6bf9bc-9z4wn\" (UID: \"a54d3460-718f-4407-98c3-b431319cb589\") " pod="kube-system/coredns-668d6bf9bc-9z4wn" May 8 00:40:34.185488 kubelet[1956]: I0508 00:40:34.185362 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psbhd\" (UniqueName: \"kubernetes.io/projected/4c61ef1f-41e0-4e37-971a-16e5f90dc7ff-kube-api-access-psbhd\") pod \"calico-kube-controllers-65bb755b6d-bp9hs\" (UID: \"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff\") " pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" May 8 00:40:34.185488 kubelet[1956]: I0508 00:40:34.185382 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4bbw4\" (UniqueName: \"kubernetes.io/projected/a54d3460-718f-4407-98c3-b431319cb589-kube-api-access-4bbw4\") pod \"coredns-668d6bf9bc-9z4wn\" (UID: \"a54d3460-718f-4407-98c3-b431319cb589\") " pod="kube-system/coredns-668d6bf9bc-9z4wn" May 8 00:40:34.185488 kubelet[1956]: I0508 00:40:34.185400 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d-calico-apiserver-certs\") pod \"calico-apiserver-8648d74b4f-nn8fk\" (UID: \"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d\") " pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" May 8 00:40:34.185488 kubelet[1956]: I0508 00:40:34.185414 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fqhxd\" (UniqueName: \"kubernetes.io/projected/57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d-kube-api-access-fqhxd\") pod \"calico-apiserver-8648d74b4f-nn8fk\" (UID: \"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d\") " pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" May 8 00:40:34.185938 kubelet[1956]: I0508 00:40:34.185430 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4c61ef1f-41e0-4e37-971a-16e5f90dc7ff-tigera-ca-bundle\") pod \"calico-kube-controllers-65bb755b6d-bp9hs\" (UID: \"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff\") " pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" May 8 00:40:34.188064 systemd[1]: Created slice kubepods-burstable-poda54d3460_718f_4407_98c3_b431319cb589.slice. May 8 00:40:34.192079 systemd[1]: Created slice kubepods-besteffort-pod4c61ef1f_41e0_4e37_971a_16e5f90dc7ff.slice. May 8 00:40:34.196103 systemd[1]: Created slice kubepods-burstable-pod0b5352dd_133d_49d5_bee4_b3ab69bc975c.slice. May 8 00:40:34.198455 systemd[1]: Created slice kubepods-besteffort-podb03d252a_cc0d_4923_bef4_402eb924aa23.slice. May 8 00:40:34.285830 kubelet[1956]: I0508 00:40:34.285783 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b03d252a-cc0d-4923-bef4-402eb924aa23-calico-apiserver-certs\") pod \"calico-apiserver-8648d74b4f-wxqtb\" (UID: \"b03d252a-cc0d-4923-bef4-402eb924aa23\") " pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" May 8 00:40:34.286120 kubelet[1956]: I0508 00:40:34.286100 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0b5352dd-133d-49d5-bee4-b3ab69bc975c-config-volume\") pod \"coredns-668d6bf9bc-qww7p\" (UID: \"0b5352dd-133d-49d5-bee4-b3ab69bc975c\") " pod="kube-system/coredns-668d6bf9bc-qww7p" May 8 00:40:34.286266 kubelet[1956]: I0508 00:40:34.286243 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6mndz\" (UniqueName: \"kubernetes.io/projected/b03d252a-cc0d-4923-bef4-402eb924aa23-kube-api-access-6mndz\") pod \"calico-apiserver-8648d74b4f-wxqtb\" (UID: \"b03d252a-cc0d-4923-bef4-402eb924aa23\") " pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" May 8 00:40:34.286367 kubelet[1956]: I0508 00:40:34.286349 1956 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rds56\" (UniqueName: \"kubernetes.io/projected/0b5352dd-133d-49d5-bee4-b3ab69bc975c-kube-api-access-rds56\") pod \"coredns-668d6bf9bc-qww7p\" (UID: \"0b5352dd-133d-49d5-bee4-b3ab69bc975c\") " pod="kube-system/coredns-668d6bf9bc-qww7p" May 8 00:40:34.789045 env[1200]: time="2025-05-08T00:40:34.788989908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-nn8fk,Uid:57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d,Namespace:calico-apiserver,Attempt:0,}" May 8 00:40:34.790187 kubelet[1956]: E0508 00:40:34.790150 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:34.790424 env[1200]: time="2025-05-08T00:40:34.790401969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9z4wn,Uid:a54d3460-718f-4407-98c3-b431319cb589,Namespace:kube-system,Attempt:0,}" May 8 00:40:34.794890 env[1200]: time="2025-05-08T00:40:34.794864358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65bb755b6d-bp9hs,Uid:4c61ef1f-41e0-4e37-971a-16e5f90dc7ff,Namespace:calico-system,Attempt:0,}" May 8 00:40:34.798154 kubelet[1956]: E0508 00:40:34.798127 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:34.798398 env[1200]: time="2025-05-08T00:40:34.798376261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qww7p,Uid:0b5352dd-133d-49d5-bee4-b3ab69bc975c,Namespace:kube-system,Attempt:0,}" May 8 00:40:34.800822 env[1200]: time="2025-05-08T00:40:34.800798069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-wxqtb,Uid:b03d252a-cc0d-4923-bef4-402eb924aa23,Namespace:calico-apiserver,Attempt:0,}" May 8 00:40:34.853881 systemd[1]: Created slice kubepods-besteffort-pod59f3f0bd_aa76_43d9_9627_17698227048d.slice. May 8 00:40:34.855870 env[1200]: time="2025-05-08T00:40:34.855839072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxwb2,Uid:59f3f0bd-aa76-43d9-9627-17698227048d,Namespace:calico-system,Attempt:0,}" May 8 00:40:35.049760 kubelet[1956]: E0508 00:40:35.049652 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:35.050248 env[1200]: time="2025-05-08T00:40:35.050214010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:40:36.039105 env[1200]: time="2025-05-08T00:40:36.038987387Z" level=error msg="Failed to destroy network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.039598 env[1200]: time="2025-05-08T00:40:36.039558209Z" level=error msg="encountered an error cleaning up failed sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.039660 env[1200]: time="2025-05-08T00:40:36.039617831Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-wxqtb,Uid:b03d252a-cc0d-4923-bef4-402eb924aa23,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.039925 kubelet[1956]: E0508 00:40:36.039865 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.045576 kubelet[1956]: E0508 00:40:36.045527 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" May 8 00:40:36.045651 kubelet[1956]: E0508 00:40:36.045579 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" May 8 00:40:36.052683 env[1200]: time="2025-05-08T00:40:36.052618217Z" level=error msg="Failed to destroy network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.054108 env[1200]: time="2025-05-08T00:40:36.053534197Z" level=error msg="encountered an error cleaning up failed sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.054108 env[1200]: time="2025-05-08T00:40:36.053591093Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-nn8fk,Uid:57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.054235 kubelet[1956]: E0508 00:40:36.053831 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.054235 kubelet[1956]: E0508 00:40:36.053924 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" May 8 00:40:36.054235 kubelet[1956]: E0508 00:40:36.053997 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" May 8 00:40:36.065860 env[1200]: time="2025-05-08T00:40:36.065803090Z" level=error msg="Failed to destroy network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.066208 env[1200]: time="2025-05-08T00:40:36.066172923Z" level=error msg="encountered an error cleaning up failed sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.066287 env[1200]: time="2025-05-08T00:40:36.066219110Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9z4wn,Uid:a54d3460-718f-4407-98c3-b431319cb589,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.066936 kubelet[1956]: E0508 00:40:36.066652 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.066936 kubelet[1956]: E0508 00:40:36.066719 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-9z4wn" May 8 00:40:36.066936 kubelet[1956]: E0508 00:40:36.066739 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-9z4wn" May 8 00:40:36.073344 env[1200]: time="2025-05-08T00:40:36.073291087Z" level=error msg="Failed to destroy network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.073794 env[1200]: time="2025-05-08T00:40:36.073766730Z" level=error msg="encountered an error cleaning up failed sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.073931 env[1200]: time="2025-05-08T00:40:36.073900321Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65bb755b6d-bp9hs,Uid:4c61ef1f-41e0-4e37-971a-16e5f90dc7ff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.076309 env[1200]: time="2025-05-08T00:40:36.076262405Z" level=error msg="Failed to destroy network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.076628 env[1200]: time="2025-05-08T00:40:36.076590641Z" level=error msg="encountered an error cleaning up failed sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.076682 env[1200]: time="2025-05-08T00:40:36.076634563Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qww7p,Uid:0b5352dd-133d-49d5-bee4-b3ab69bc975c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.085318 env[1200]: time="2025-05-08T00:40:36.085251231Z" level=error msg="Failed to destroy network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.085664 env[1200]: time="2025-05-08T00:40:36.085627717Z" level=error msg="encountered an error cleaning up failed sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.085700 env[1200]: time="2025-05-08T00:40:36.085678352Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxwb2,Uid:59f3f0bd-aa76-43d9-9627-17698227048d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.089502 kubelet[1956]: E0508 00:40:36.089463 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.089568 kubelet[1956]: E0508 00:40:36.089508 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:36.089568 kubelet[1956]: E0508 00:40:36.089527 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lxwb2" May 8 00:40:36.091194 kubelet[1956]: E0508 00:40:36.090902 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lxwb2_calico-system(59f3f0bd-aa76-43d9-9627-17698227048d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lxwb2_calico-system(59f3f0bd-aa76-43d9-9627-17698227048d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:36.091194 kubelet[1956]: E0508 00:40:36.090902 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-9z4wn_kube-system(a54d3460-718f-4407-98c3-b431319cb589)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-9z4wn_kube-system(a54d3460-718f-4407-98c3-b431319cb589)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-9z4wn" podUID="a54d3460-718f-4407-98c3-b431319cb589" May 8 00:40:36.091194 kubelet[1956]: E0508 00:40:36.090969 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.091378 kubelet[1956]: E0508 00:40:36.090955 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8648d74b4f-nn8fk_calico-apiserver(57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8648d74b4f-nn8fk_calico-apiserver(57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" podUID="57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d" May 8 00:40:36.091378 kubelet[1956]: E0508 00:40:36.090996 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" May 8 00:40:36.091467 kubelet[1956]: E0508 00:40:36.090975 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8648d74b4f-wxqtb_calico-apiserver(b03d252a-cc0d-4923-bef4-402eb924aa23)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8648d74b4f-wxqtb_calico-apiserver(b03d252a-cc0d-4923-bef4-402eb924aa23)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" podUID="b03d252a-cc0d-4923-bef4-402eb924aa23" May 8 00:40:36.091467 kubelet[1956]: I0508 00:40:36.091047 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:36.091467 kubelet[1956]: E0508 00:40:36.091058 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.091467 kubelet[1956]: E0508 00:40:36.091017 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" May 8 00:40:36.091609 kubelet[1956]: E0508 00:40:36.091097 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qww7p" May 8 00:40:36.091609 kubelet[1956]: E0508 00:40:36.091128 1956 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qww7p" May 8 00:40:36.091609 kubelet[1956]: E0508 00:40:36.091122 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65bb755b6d-bp9hs_calico-system(4c61ef1f-41e0-4e37-971a-16e5f90dc7ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65bb755b6d-bp9hs_calico-system(4c61ef1f-41e0-4e37-971a-16e5f90dc7ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" podUID="4c61ef1f-41e0-4e37-971a-16e5f90dc7ff" May 8 00:40:36.091718 kubelet[1956]: E0508 00:40:36.091161 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-qww7p_kube-system(0b5352dd-133d-49d5-bee4-b3ab69bc975c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-qww7p_kube-system(0b5352dd-133d-49d5-bee4-b3ab69bc975c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qww7p" podUID="0b5352dd-133d-49d5-bee4-b3ab69bc975c" May 8 00:40:36.092159 kubelet[1956]: I0508 00:40:36.092124 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:36.099813 env[1200]: time="2025-05-08T00:40:36.099781919Z" level=info msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" May 8 00:40:36.125839 env[1200]: time="2025-05-08T00:40:36.125554113Z" level=error msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" failed" error="failed to destroy network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:36.126303 kubelet[1956]: E0508 00:40:36.126111 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:36.126303 kubelet[1956]: E0508 00:40:36.126179 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3"} May 8 00:40:36.126303 kubelet[1956]: E0508 00:40:36.126239 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:36.126303 kubelet[1956]: E0508 00:40:36.126260 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" podUID="57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d" May 8 00:40:36.464630 systemd[1]: Started sshd@7-10.0.0.23:22-10.0.0.1:54392.service. May 8 00:40:36.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.23:22-10.0.0.1:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:36.472076 kernel: audit: type=1130 audit(1746664836.463:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.23:22-10.0.0.1:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:36.508000 audit[3048]: USER_ACCT pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.511287 sshd[3048]: Accepted publickey for core from 10.0.0.1 port 54392 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:36.511561 sshd[3048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:36.518187 kernel: audit: type=1101 audit(1746664836.508:1004): pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.518249 kernel: audit: type=1103 audit(1746664836.510:1005): pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.510000 audit[3048]: CRED_ACQ pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.521013 kernel: audit: type=1006 audit(1746664836.510:1006): pid=3048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 8 00:40:36.519672 systemd[1]: Started session-8.scope. May 8 00:40:36.520300 systemd-logind[1189]: New session 8 of user core. May 8 00:40:36.510000 audit[3048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b611990 a2=3 a3=0 items=0 ppid=1 pid=3048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.510000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:36.527216 kernel: audit: type=1300 audit(1746664836.510:1006): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b611990 a2=3 a3=0 items=0 ppid=1 pid=3048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.527291 kernel: audit: type=1327 audit(1746664836.510:1006): proctitle=737368643A20636F7265205B707269765D May 8 00:40:36.527324 kernel: audit: type=1105 audit(1746664836.525:1007): pid=3048 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.525000 audit[3048]: USER_START pid=3048 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.526000 audit[3050]: CRED_ACQ pid=3050 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.535719 kernel: audit: type=1103 audit(1746664836.526:1008): pid=3050 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.665838 sshd[3048]: pam_unix(sshd:session): session closed for user core May 8 00:40:36.665000 audit[3048]: USER_END pid=3048 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.668453 systemd[1]: sshd@7-10.0.0.23:22-10.0.0.1:54392.service: Deactivated successfully. May 8 00:40:36.669438 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:40:36.670334 systemd-logind[1189]: Session 8 logged out. Waiting for processes to exit. May 8 00:40:36.671175 systemd-logind[1189]: Removed session 8. May 8 00:40:36.665000 audit[3048]: CRED_DISP pid=3048 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.672096 kernel: audit: type=1106 audit(1746664836.665:1009): pid=3048 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.23:22-10.0.0.1:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:36.832791 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157-shm.mount: Deactivated successfully. May 8 00:40:36.832899 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a-shm.mount: Deactivated successfully. May 8 00:40:36.832957 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac-shm.mount: Deactivated successfully. May 8 00:40:36.833010 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679-shm.mount: Deactivated successfully. May 8 00:40:36.833098 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3-shm.mount: Deactivated successfully. May 8 00:40:36.833160 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807-shm.mount: Deactivated successfully. May 8 00:40:37.094601 kubelet[1956]: I0508 00:40:37.094479 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:37.095109 env[1200]: time="2025-05-08T00:40:37.095069512Z" level=info msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" May 8 00:40:37.095594 kubelet[1956]: I0508 00:40:37.095562 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:37.096005 env[1200]: time="2025-05-08T00:40:37.095975253Z" level=info msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" May 8 00:40:37.096635 kubelet[1956]: I0508 00:40:37.096600 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:37.096950 env[1200]: time="2025-05-08T00:40:37.096917151Z" level=info msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" May 8 00:40:37.098329 kubelet[1956]: I0508 00:40:37.098306 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:37.098595 env[1200]: time="2025-05-08T00:40:37.098567569Z" level=info msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" May 8 00:40:37.098708 env[1200]: time="2025-05-08T00:40:37.098685811Z" level=info msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" May 8 00:40:37.124214 env[1200]: time="2025-05-08T00:40:37.124151356Z" level=error msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" failed" error="failed to destroy network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:37.124774 kubelet[1956]: E0508 00:40:37.124618 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:37.124774 kubelet[1956]: E0508 00:40:37.124669 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157"} May 8 00:40:37.124774 kubelet[1956]: E0508 00:40:37.124706 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"59f3f0bd-aa76-43d9-9627-17698227048d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:37.124774 kubelet[1956]: E0508 00:40:37.124732 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"59f3f0bd-aa76-43d9-9627-17698227048d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lxwb2" podUID="59f3f0bd-aa76-43d9-9627-17698227048d" May 8 00:40:37.130289 env[1200]: time="2025-05-08T00:40:37.130221742Z" level=error msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" failed" error="failed to destroy network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:37.130867 kubelet[1956]: E0508 00:40:37.130715 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:37.130867 kubelet[1956]: E0508 00:40:37.130767 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a"} May 8 00:40:37.130867 kubelet[1956]: E0508 00:40:37.130810 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b5352dd-133d-49d5-bee4-b3ab69bc975c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:37.130867 kubelet[1956]: E0508 00:40:37.130831 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b5352dd-133d-49d5-bee4-b3ab69bc975c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qww7p" podUID="0b5352dd-133d-49d5-bee4-b3ab69bc975c" May 8 00:40:37.135391 env[1200]: time="2025-05-08T00:40:37.135334109Z" level=error msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" failed" error="failed to destroy network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:37.135691 kubelet[1956]: E0508 00:40:37.135597 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:37.135691 kubelet[1956]: E0508 00:40:37.135624 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac"} May 8 00:40:37.135691 kubelet[1956]: E0508 00:40:37.135649 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:37.135691 kubelet[1956]: E0508 00:40:37.135664 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" podUID="4c61ef1f-41e0-4e37-971a-16e5f90dc7ff" May 8 00:40:37.136125 env[1200]: time="2025-05-08T00:40:37.136092122Z" level=error msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" failed" error="failed to destroy network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:37.136285 kubelet[1956]: E0508 00:40:37.136238 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:37.136351 kubelet[1956]: E0508 00:40:37.136301 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679"} May 8 00:40:37.136351 kubelet[1956]: E0508 00:40:37.136336 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a54d3460-718f-4407-98c3-b431319cb589\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:37.136467 kubelet[1956]: E0508 00:40:37.136358 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a54d3460-718f-4407-98c3-b431319cb589\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-9z4wn" podUID="a54d3460-718f-4407-98c3-b431319cb589" May 8 00:40:37.145678 env[1200]: time="2025-05-08T00:40:37.145617964Z" level=error msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" failed" error="failed to destroy network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:40:37.145871 kubelet[1956]: E0508 00:40:37.145808 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:37.145871 kubelet[1956]: E0508 00:40:37.145859 1956 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807"} May 8 00:40:37.145945 kubelet[1956]: E0508 00:40:37.145886 1956 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b03d252a-cc0d-4923-bef4-402eb924aa23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:40:37.145945 kubelet[1956]: E0508 00:40:37.145905 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b03d252a-cc0d-4923-bef4-402eb924aa23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" podUID="b03d252a-cc0d-4923-bef4-402eb924aa23" May 8 00:40:41.675928 kernel: kauditd_printk_skb: 2 callbacks suppressed May 8 00:40:41.676116 kernel: audit: type=1130 audit(1746664841.669:1012): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:41.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:41.670283 systemd[1]: Started sshd@8-10.0.0.23:22-10.0.0.1:54406.service. May 8 00:40:41.709000 audit[3177]: USER_ACCT pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.710982 sshd[3177]: Accepted publickey for core from 10.0.0.1 port 54406 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:41.715128 kernel: audit: type=1101 audit(1746664841.709:1013): pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.715188 kernel: audit: type=1103 audit(1746664841.714:1014): pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.714000 audit[3177]: CRED_ACQ pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.715474 sshd[3177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:41.727286 kernel: audit: type=1006 audit(1746664841.714:1015): pid=3177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 8 00:40:41.727375 kernel: audit: type=1300 audit(1746664841.714:1015): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c6b06d0 a2=3 a3=0 items=0 ppid=1 pid=3177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:41.727403 kernel: audit: type=1327 audit(1746664841.714:1015): proctitle=737368643A20636F7265205B707269765D May 8 00:40:41.714000 audit[3177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c6b06d0 a2=3 a3=0 items=0 ppid=1 pid=3177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:41.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:41.719893 systemd-logind[1189]: New session 9 of user core. May 8 00:40:41.720322 systemd[1]: Started session-9.scope. May 8 00:40:41.724000 audit[3177]: USER_START pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.725000 audit[3179]: CRED_ACQ pid=3179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.735804 kernel: audit: type=1105 audit(1746664841.724:1016): pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.735866 kernel: audit: type=1103 audit(1746664841.725:1017): pid=3179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.966645 sshd[3177]: pam_unix(sshd:session): session closed for user core May 8 00:40:41.976437 kernel: audit: type=1106 audit(1746664841.966:1018): pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.976506 kernel: audit: type=1104 audit(1746664841.966:1019): pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.966000 audit[3177]: USER_END pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.966000 audit[3177]: CRED_DISP pid=3177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:41.975490 systemd[1]: sshd@8-10.0.0.23:22-10.0.0.1:54406.service: Deactivated successfully. May 8 00:40:41.976160 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:40:41.976657 systemd-logind[1189]: Session 9 logged out. Waiting for processes to exit. May 8 00:40:41.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:41.977325 systemd-logind[1189]: Removed session 9. May 8 00:40:42.811801 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3496437483.mount: Deactivated successfully. May 8 00:40:45.355911 env[1200]: time="2025-05-08T00:40:45.355833708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:45.359001 env[1200]: time="2025-05-08T00:40:45.358947201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:45.360840 env[1200]: time="2025-05-08T00:40:45.360793185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:45.362348 env[1200]: time="2025-05-08T00:40:45.362314720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:45.362679 env[1200]: time="2025-05-08T00:40:45.362645241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 8 00:40:45.370474 env[1200]: time="2025-05-08T00:40:45.370438536Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:40:45.390695 env[1200]: time="2025-05-08T00:40:45.390616322Z" level=info msg="CreateContainer within sandbox \"253119c69cfc86f6296ce93b40ec6a3e83942965f581d23d322521eb6205dc5b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e405116c4c272809431b03f480950e374750c9d260ffb471d8a93b7106c40892\"" May 8 00:40:45.391277 env[1200]: time="2025-05-08T00:40:45.391244251Z" level=info msg="StartContainer for \"e405116c4c272809431b03f480950e374750c9d260ffb471d8a93b7106c40892\"" May 8 00:40:45.411687 systemd[1]: Started cri-containerd-e405116c4c272809431b03f480950e374750c9d260ffb471d8a93b7106c40892.scope. May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3d76a34018 items=0 ppid=2470 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303531313663346332373238303934333162303366343830393530 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit: BPF prog-id=136 op=LOAD May 8 00:40:45.434000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa898 items=0 ppid=2470 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303531313663346332373238303934333162303366343830393530 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit: BPF prog-id=137 op=LOAD May 8 00:40:45.434000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa8e8 items=0 ppid=2470 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303531313663346332373238303934333162303366343830393530 May 8 00:40:45.434000 audit: BPF prog-id=137 op=UNLOAD May 8 00:40:45.434000 audit: BPF prog-id=136 op=UNLOAD May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:45.434000 audit: BPF prog-id=138 op=LOAD May 8 00:40:45.434000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fa978 items=0 ppid=2470 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303531313663346332373238303934333162303366343830393530 May 8 00:40:45.550383 env[1200]: time="2025-05-08T00:40:45.550308996Z" level=info msg="StartContainer for \"e405116c4c272809431b03f480950e374750c9d260ffb471d8a93b7106c40892\" returns successfully" May 8 00:40:45.612450 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:40:45.612666 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:40:46.115683 kubelet[1956]: E0508 00:40:46.115590 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:46.972949 systemd[1]: Started sshd@9-10.0.0.23:22-10.0.0.1:54902.service. May 8 00:40:46.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:46.974181 kernel: kauditd_printk_skb: 44 callbacks suppressed May 8 00:40:46.974251 kernel: audit: type=1130 audit(1746664846.972:1027): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:47.015000 audit[3282]: USER_ACCT pid=3282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.016565 sshd[3282]: Accepted publickey for core from 10.0.0.1 port 54902 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:47.018808 sshd[3282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:47.017000 audit[3282]: CRED_ACQ pid=3282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.022676 systemd-logind[1189]: New session 10 of user core. May 8 00:40:47.023485 systemd[1]: Started session-10.scope. May 8 00:40:47.025812 kernel: audit: type=1101 audit(1746664847.015:1028): pid=3282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.025885 kernel: audit: type=1103 audit(1746664847.017:1029): pid=3282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.025912 kernel: audit: type=1006 audit(1746664847.017:1030): pid=3282 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 8 00:40:47.017000 audit[3282]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b1d8ac0 a2=3 a3=0 items=0 ppid=1 pid=3282 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.033429 kernel: audit: type=1300 audit(1746664847.017:1030): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b1d8ac0 a2=3 a3=0 items=0 ppid=1 pid=3282 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.033485 kernel: audit: type=1327 audit(1746664847.017:1030): proctitle=737368643A20636F7265205B707269765D May 8 00:40:47.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:47.026000 audit[3282]: USER_START pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.040259 kernel: audit: type=1105 audit(1746664847.026:1031): pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.040384 kernel: audit: type=1103 audit(1746664847.027:1032): pid=3284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.027000 audit[3284]: CRED_ACQ pid=3284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.117223 kubelet[1956]: E0508 00:40:47.117189 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:47.140400 systemd[1]: run-containerd-runc-k8s.io-e405116c4c272809431b03f480950e374750c9d260ffb471d8a93b7106c40892-runc.e7buKR.mount: Deactivated successfully. May 8 00:40:47.170319 sshd[3282]: pam_unix(sshd:session): session closed for user core May 8 00:40:47.171000 audit[3282]: USER_END pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.181064 kernel: audit: type=1106 audit(1746664847.171:1033): pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.181156 kernel: audit: type=1104 audit(1746664847.171:1034): pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.171000 audit[3282]: CRED_DISP pid=3282 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:47.178121 systemd[1]: sshd@9-10.0.0.23:22-10.0.0.1:54902.service: Deactivated successfully. May 8 00:40:47.178881 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:40:47.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:47.181976 systemd-logind[1189]: Session 10 logged out. Waiting for processes to exit. May 8 00:40:47.183108 systemd-logind[1189]: Removed session 10. May 8 00:40:47.391000 audit[3365]: AVC avc: denied { write } for pid=3365 comm="tee" name="fd" dev="proc" ino=24343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.391000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0e6eaa2a a2=241 a3=1b6 items=1 ppid=3329 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.391000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:40:47.391000 audit: PATH item=0 name="/dev/fd/63" inode=23408 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.391000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.396000 audit[3357]: AVC avc: denied { write } for pid=3357 comm="tee" name="fd" dev="proc" ino=25779 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.396000 audit[3357]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4fe5ea2b a2=241 a3=1b6 items=1 ppid=3328 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.396000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:40:47.396000 audit: PATH item=0 name="/dev/fd/63" inode=23405 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.396000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.401000 audit[3376]: AVC avc: denied { write } for pid=3376 comm="tee" name="fd" dev="proc" ino=23417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.401000 audit[3376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffccfb04a1b a2=241 a3=1b6 items=1 ppid=3333 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.401000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:40:47.401000 audit: PATH item=0 name="/dev/fd/63" inode=25774 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.407000 audit[3383]: AVC avc: denied { write } for pid=3383 comm="tee" name="fd" dev="proc" ino=23424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.407000 audit[3383]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe34c4ea1a a2=241 a3=1b6 items=1 ppid=3327 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.407000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:40:47.407000 audit: PATH item=0 name="/dev/fd/63" inode=24340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.407000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.410000 audit[3389]: AVC avc: denied { write } for pid=3389 comm="tee" name="fd" dev="proc" ino=24350 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.410000 audit[3389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd06781a2c a2=241 a3=1b6 items=1 ppid=3338 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.410000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:40:47.410000 audit: PATH item=0 name="/dev/fd/63" inode=24344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.410000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.435000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=23428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.435000 audit[3399]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeede7a2a a2=241 a3=1b6 items=1 ppid=3332 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.435000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:40:47.435000 audit: PATH item=0 name="/dev/fd/63" inode=23421 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.443000 audit[3409]: AVC avc: denied { write } for pid=3409 comm="tee" name="fd" dev="proc" ino=23435 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:40:47.443000 audit[3409]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd91939a2a a2=241 a3=1b6 items=1 ppid=3344 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.443000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:40:47.443000 audit: PATH item=0 name="/dev/fd/63" inode=23432 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:47.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit: BPF prog-id=139 op=LOAD May 8 00:40:47.522000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf0fe0d40 a2=98 a3=3 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.522000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.522000 audit: BPF prog-id=139 op=UNLOAD May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit: BPF prog-id=140 op=LOAD May 8 00:40:47.522000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf0fe0b20 a2=74 a3=540051 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.522000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.522000 audit: BPF prog-id=140 op=UNLOAD May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.522000 audit: BPF prog-id=141 op=LOAD May 8 00:40:47.522000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf0fe0b50 a2=94 a3=2 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.522000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.522000 audit: BPF prog-id=141 op=UNLOAD May 8 00:40:47.631000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.631000 audit: BPF prog-id=142 op=LOAD May 8 00:40:47.631000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf0fe0a10 a2=40 a3=1 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.632000 audit: BPF prog-id=142 op=UNLOAD May 8 00:40:47.632000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.632000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf0fe0ae0 a2=50 a3=7ffdf0fe0bc0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.640000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.640000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0a20 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.640000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.640000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf0fe0a50 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.640000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.640000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf0fe0960 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.641000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.641000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0a70 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.641000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.641000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.641000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0a50 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.641000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0a40 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0a70 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf0fe0a50 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf0fe0a70 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf0fe0a40 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf0fe0ab0 a2=28 a3=0 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.643000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.643000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf0fe0860 a2=50 a3=1 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit: BPF prog-id=143 op=LOAD May 8 00:40:47.644000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf0fe0860 a2=94 a3=5 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.644000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.644000 audit: BPF prog-id=143 op=UNLOAD May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf0fe0910 a2=50 a3=1 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.644000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdf0fe0a30 a2=4 a3=38 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.644000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.644000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.644000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf0fe0a80 a2=94 a3=6 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.644000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.645000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf0fe0230 a2=94 a3=83 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.645000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.645000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf0fe0230 a2=94 a3=83 items=0 ppid=3336 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit: BPF prog-id=144 op=LOAD May 8 00:40:47.654000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe42f1ec30 a2=98 a3=1999999999999999 items=0 ppid=3336 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.654000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:40:47.654000 audit: BPF prog-id=144 op=UNLOAD May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit: BPF prog-id=145 op=LOAD May 8 00:40:47.654000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe42f1eb10 a2=74 a3=ffff items=0 ppid=3336 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.654000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:40:47.654000 audit: BPF prog-id=145 op=UNLOAD May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.654000 audit: BPF prog-id=146 op=LOAD May 8 00:40:47.654000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe42f1eb50 a2=40 a3=7ffe42f1ed30 items=0 ppid=3336 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.654000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:40:47.654000 audit: BPF prog-id=146 op=UNLOAD May 8 00:40:47.679000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:47.679000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:47.679000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024682a0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:47.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:47.679000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001500700 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:47.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:47.719469 systemd-networkd[1025]: vxlan.calico: Link UP May 8 00:40:47.719477 systemd-networkd[1025]: vxlan.calico: Gained carrier May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit: BPF prog-id=147 op=LOAD May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea0b30150 a2=98 a3=ffffffff items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit: BPF prog-id=147 op=UNLOAD May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit: BPF prog-id=148 op=LOAD May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea0b2ff60 a2=74 a3=540051 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit: BPF prog-id=148 op=UNLOAD May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit: BPF prog-id=149 op=LOAD May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea0b2ff90 a2=94 a3=2 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit: BPF prog-id=149 op=UNLOAD May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2fe60 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea0b2fe90 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea0b2fda0 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2feb0 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2fe90 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2fe80 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2feb0 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea0b2fe90 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea0b2feb0 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.734000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.734000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea0b2fe80 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea0b2fef0 a2=28 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit: BPF prog-id=150 op=LOAD May 8 00:40:47.735000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea0b2fd60 a2=40 a3=0 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.735000 audit: BPF prog-id=150 op=UNLOAD May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffea0b2fd50 a2=50 a3=2800 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.735000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.735000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffea0b2fd50 a2=50 a3=2800 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit: BPF prog-id=151 op=LOAD May 8 00:40:47.736000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea0b2f570 a2=94 a3=2 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.736000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.736000 audit: BPF prog-id=151 op=UNLOAD May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.736000 audit: BPF prog-id=152 op=LOAD May 8 00:40:47.736000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea0b2f670 a2=94 a3=30 items=0 ppid=3336 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.736000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.738000 audit: BPF prog-id=153 op=LOAD May 8 00:40:47.738000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe47781bb0 a2=98 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.739000 audit: BPF prog-id=153 op=UNLOAD May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit: BPF prog-id=154 op=LOAD May 8 00:40:47.739000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe47781990 a2=74 a3=540051 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.739000 audit: BPF prog-id=154 op=UNLOAD May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.739000 audit: BPF prog-id=155 op=LOAD May 8 00:40:47.739000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe477819c0 a2=94 a3=2 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.739000 audit: BPF prog-id=155 op=UNLOAD May 8 00:40:47.852467 env[1200]: time="2025-05-08T00:40:47.852425022Z" level=info msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" May 8 00:40:47.855042 env[1200]: time="2025-05-08T00:40:47.854986559Z" level=info msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" May 8 00:40:47.863000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.863000 audit: BPF prog-id=156 op=LOAD May 8 00:40:47.863000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe47781880 a2=40 a3=1 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.864000 audit: BPF prog-id=156 op=UNLOAD May 8 00:40:47.864000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.864000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe47781950 a2=50 a3=7ffe47781a30 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe47781890 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe477818c0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe477817d0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe477818e0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe477818c0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe477818b0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe477818e0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe477818c0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe477818e0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe477818b0 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe47781920 a2=28 a3=0 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe477816d0 a2=50 a3=1 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit: BPF prog-id=157 op=LOAD May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe477816d0 a2=94 a3=5 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit: BPF prog-id=157 op=UNLOAD May 8 00:40:47.873000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe47781780 a2=50 a3=1 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.873000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.873000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe477818a0 a2=4 a3=38 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.874000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe477818f0 a2=94 a3=6 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.874000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe477810a0 a2=94 a3=83 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { confidentiality } for pid=3482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:40:47.874000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe477810a0 a2=94 a3=83 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.874000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.874000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe47782ae0 a2=10 a3=208 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.875000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.875000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe47782980 a2=10 a3=3 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.875000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.875000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe47782920 a2=10 a3=3 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.875000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.875000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe47782920 a2=10 a3=7 items=0 ppid=3336 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:40:47.889000 audit: BPF prog-id=152 op=UNLOAD May 8 00:40:47.923761 kubelet[1956]: I0508 00:40:47.921666 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-56rvb" podStartSLOduration=4.316844894 podStartE2EDuration="43.921632371s" podCreationTimestamp="2025-05-08 00:40:04 +0000 UTC" firstStartedPulling="2025-05-08 00:40:05.758495049 +0000 UTC m=+14.008335874" lastFinishedPulling="2025-05-08 00:40:45.363282536 +0000 UTC m=+53.613123351" observedRunningTime="2025-05-08 00:40:46.171450409 +0000 UTC m=+54.421291224" watchObservedRunningTime="2025-05-08 00:40:47.921632371 +0000 UTC m=+56.171473186" May 8 00:40:47.950000 audit[3571]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:47.950000 audit[3571]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffc45528b0 a2=0 a3=7fffc455289c items=0 ppid=3336 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.950000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:47.965000 audit[3569]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:47.965000 audit[3569]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcce07bec0 a2=0 a3=7ffcce07beac items=0 ppid=3336 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:47.979000 audit[3574]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:47.979000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe09c16840 a2=0 a3=7ffe09c1682c items=0 ppid=3336 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:47.983000 audit[3568]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:47.983000 audit[3568]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffec2d58c80 a2=0 a3=7ffec2d58c6c items=0 ppid=3336 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.933 [INFO][3512] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.933 [INFO][3512] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" iface="eth0" netns="/var/run/netns/cni-68a8bb1a-613c-6545-bf88-de6c9c9caf6f" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.934 [INFO][3512] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" iface="eth0" netns="/var/run/netns/cni-68a8bb1a-613c-6545-bf88-de6c9c9caf6f" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.935 [INFO][3512] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" iface="eth0" netns="/var/run/netns/cni-68a8bb1a-613c-6545-bf88-de6c9c9caf6f" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.935 [INFO][3512] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.935 [INFO][3512] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.983 [INFO][3555] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.985 [INFO][3555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.985 [INFO][3555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.996 [WARNING][3555] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.996 [INFO][3555] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:47.998 [INFO][3555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:48.001803 env[1200]: 2025-05-08 00:40:48.000 [INFO][3512] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:48.003225 env[1200]: time="2025-05-08T00:40:48.003171921Z" level=info msg="TearDown network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" successfully" May 8 00:40:48.003288 env[1200]: time="2025-05-08T00:40:48.003227055Z" level=info msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" returns successfully" May 8 00:40:48.004178 env[1200]: time="2025-05-08T00:40:48.004145809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxwb2,Uid:59f3f0bd-aa76-43d9-9627-17698227048d,Namespace:calico-system,Attempt:1,}" May 8 00:40:48.005811 systemd[1]: run-netns-cni\x2d68a8bb1a\x2d613c\x2d6545\x2dbf88\x2dde6c9c9caf6f.mount: Deactivated successfully. May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.922 [INFO][3527] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.922 [INFO][3527] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" iface="eth0" netns="/var/run/netns/cni-c0250ed5-1962-bb51-7bc4-b3e6c66fba3a" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.922 [INFO][3527] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" iface="eth0" netns="/var/run/netns/cni-c0250ed5-1962-bb51-7bc4-b3e6c66fba3a" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.926 [INFO][3527] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" iface="eth0" netns="/var/run/netns/cni-c0250ed5-1962-bb51-7bc4-b3e6c66fba3a" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.926 [INFO][3527] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.926 [INFO][3527] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.989 [INFO][3550] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.989 [INFO][3550] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:47.998 [INFO][3550] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:48.006 [WARNING][3550] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:48.006 [INFO][3550] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:48.007 [INFO][3550] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:48.011269 env[1200]: 2025-05-08 00:40:48.009 [INFO][3527] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:48.011852 env[1200]: time="2025-05-08T00:40:48.011796495Z" level=info msg="TearDown network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" successfully" May 8 00:40:48.011852 env[1200]: time="2025-05-08T00:40:48.011845607Z" level=info msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" returns successfully" May 8 00:40:48.012543 env[1200]: time="2025-05-08T00:40:48.012516596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-nn8fk,Uid:57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d,Namespace:calico-apiserver,Attempt:1,}" May 8 00:40:48.014356 systemd[1]: run-netns-cni\x2dc0250ed5\x2d1962\x2dbb51\x2d7bc4\x2db3e6c66fba3a.mount: Deactivated successfully. May 8 00:40:48.084000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.084000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e9a82a0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.101000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.101000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fdb04e0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.101000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.101000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00fdb0510 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.113000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.113000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00eb46ac0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.127000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.127000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d9f4f00 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.130000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:48.130000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00ed52020 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:40:48.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:40:48.979213 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL May 8 00:40:50.414519 systemd-networkd[1025]: cali4de9519a15c: Link UP May 8 00:40:50.416905 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:40:50.416957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4de9519a15c: link becomes ready May 8 00:40:50.417136 systemd-networkd[1025]: cali4de9519a15c: Gained carrier May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.269 [INFO][3602] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0 calico-apiserver-8648d74b4f- calico-apiserver 57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d 923 0 2025-05-08 00:40:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8648d74b4f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8648d74b4f-nn8fk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4de9519a15c [] []}} ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.269 [INFO][3602] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.304 [INFO][3627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" HandleID="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.314 [INFO][3627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" HandleID="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027fce0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8648d74b4f-nn8fk", "timestamp":"2025-05-08 00:40:50.304884145 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.314 [INFO][3627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.314 [INFO][3627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.314 [INFO][3627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.319 [INFO][3627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.331 [INFO][3627] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.336 [INFO][3627] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.338 [INFO][3627] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.339 [INFO][3627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.340 [INFO][3627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.341 [INFO][3627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5 May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.379 [INFO][3627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.405 [INFO][3627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.405 [INFO][3627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" host="localhost" May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.405 [INFO][3627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:50.607653 env[1200]: 2025-05-08 00:40:50.405 [INFO][3627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" HandleID="k8s-pod-network.0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.408 [INFO][3602] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8648d74b4f-nn8fk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4de9519a15c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.408 [INFO][3602] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.408 [INFO][3602] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4de9519a15c ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.423 [INFO][3602] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.424 [INFO][3602] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5", Pod:"calico-apiserver-8648d74b4f-nn8fk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4de9519a15c", MAC:"c2:4e:a7:da:5b:5f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:50.608511 env[1200]: 2025-05-08 00:40:50.605 [INFO][3602] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-nn8fk" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:50.616000 audit[3647]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:50.616000 audit[3647]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffe45bfe100 a2=0 a3=7ffe45bfe0ec items=0 ppid=3336 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:50.616000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:50.852991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb5bd1f775a: link becomes ready May 8 00:40:50.853271 env[1200]: time="2025-05-08T00:40:50.850747705Z" level=info msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" May 8 00:40:50.852318 systemd-networkd[1025]: calibb5bd1f775a: Link UP May 8 00:40:50.852783 systemd-networkd[1025]: calibb5bd1f775a: Gained carrier May 8 00:40:51.067614 env[1200]: time="2025-05-08T00:40:51.067528031Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:51.067827 env[1200]: time="2025-05-08T00:40:51.067583629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:51.067827 env[1200]: time="2025-05-08T00:40:51.067595762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:51.067827 env[1200]: time="2025-05-08T00:40:51.067752726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5 pid=3678 runtime=io.containerd.runc.v2 May 8 00:40:51.082342 systemd[1]: Started cri-containerd-0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5.scope. May 8 00:40:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit: BPF prog-id=158 op=LOAD May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3678 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373963636165336337626362343739383661663463633137336666 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3678 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373963636165336337626362343739383661663463633137336666 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit: BPF prog-id=159 op=LOAD May 8 00:40:51.092000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031c8f0 items=0 ppid=3678 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373963636165336337626362343739383661663463633137336666 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.092000 audit: BPF prog-id=160 op=LOAD May 8 00:40:51.092000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031c938 items=0 ppid=3678 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373963636165336337626362343739383661663463633137336666 May 8 00:40:51.093000 audit: BPF prog-id=160 op=UNLOAD May 8 00:40:51.093000 audit: BPF prog-id=159 op=UNLOAD May 8 00:40:51.093000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.093000 audit: BPF prog-id=161 op=LOAD May 8 00:40:51.093000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031cd48 items=0 ppid=3678 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373963636165336337626362343739383661663463633137336666 May 8 00:40:51.094868 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:51.119901 env[1200]: time="2025-05-08T00:40:51.118183065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-nn8fk,Uid:57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5\"" May 8 00:40:51.119901 env[1200]: time="2025-05-08T00:40:51.119562826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.230 [INFO][3588] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--lxwb2-eth0 csi-node-driver- calico-system 59f3f0bd-aa76-43d9-9627-17698227048d 924 0 2025-05-08 00:40:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-lxwb2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calibb5bd1f775a [] []}} ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.234 [INFO][3588] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.280 [INFO][3617] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" HandleID="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.314 [INFO][3617] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" HandleID="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005a3460), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-lxwb2", "timestamp":"2025-05-08 00:40:50.280865851 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.314 [INFO][3617] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.405 [INFO][3617] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.405 [INFO][3617] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.430 [INFO][3617] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.606 [INFO][3617] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.715 [INFO][3617] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.717 [INFO][3617] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.720 [INFO][3617] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.720 [INFO][3617] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.722 [INFO][3617] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4 May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.738 [INFO][3617] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.786 [INFO][3617] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.787 [INFO][3617] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" host="localhost" May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.787 [INFO][3617] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:51.251708 env[1200]: 2025-05-08 00:40:50.787 [INFO][3617] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" HandleID="k8s-pod-network.67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:50.789 [INFO][3588] cni-plugin/k8s.go 386: Populated endpoint ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--lxwb2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f3f0bd-aa76-43d9-9627-17698227048d", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-lxwb2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb5bd1f775a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:50.789 [INFO][3588] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:50.789 [INFO][3588] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibb5bd1f775a ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:50.791 [INFO][3588] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:50.791 [INFO][3588] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--lxwb2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f3f0bd-aa76-43d9-9627-17698227048d", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4", Pod:"csi-node-driver-lxwb2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb5bd1f775a", MAC:"aa:96:97:d5:75:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:51.252388 env[1200]: 2025-05-08 00:40:51.249 [INFO][3588] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4" Namespace="calico-system" Pod="csi-node-driver-lxwb2" WorkloadEndpoint="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:51.260000 audit[3725]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:51.260000 audit[3725]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc301c4b10 a2=0 a3=7ffc301c4afc items=0 ppid=3336 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.260000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:51.325961 env[1200]: time="2025-05-08T00:40:51.325851461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:51.325961 env[1200]: time="2025-05-08T00:40:51.325899634Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:51.325961 env[1200]: time="2025-05-08T00:40:51.325911668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:51.326381 env[1200]: time="2025-05-08T00:40:51.326313706Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4 pid=3733 runtime=io.containerd.runc.v2 May 8 00:40:51.342819 systemd[1]: Started cri-containerd-67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4.scope. May 8 00:40:51.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.350000 audit: BPF prog-id=162 op=LOAD May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3733 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633362323533656430363865636265326161646463656564623039 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3733 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633362323533656430363865636265326161646463656564623039 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit: BPF prog-id=163 op=LOAD May 8 00:40:51.351000 audit[3743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028cbd0 items=0 ppid=3733 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633362323533656430363865636265326161646463656564623039 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit: BPF prog-id=164 op=LOAD May 8 00:40:51.351000 audit[3743]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028cc18 items=0 ppid=3733 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633362323533656430363865636265326161646463656564623039 May 8 00:40:51.351000 audit: BPF prog-id=164 op=UNLOAD May 8 00:40:51.351000 audit: BPF prog-id=163 op=UNLOAD May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:51.351000 audit: BPF prog-id=165 op=LOAD May 8 00:40:51.351000 audit[3743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028d028 items=0 ppid=3733 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633362323533656430363865636265326161646463656564623039 May 8 00:40:51.353370 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:51.362772 env[1200]: time="2025-05-08T00:40:51.362713936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxwb2,Uid:59f3f0bd-aa76-43d9-9627-17698227048d,Namespace:calico-system,Attempt:1,} returns sandbox id \"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4\"" May 8 00:40:51.506000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:51.506000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:51.506000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001500240 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:51.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:51.506000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001684560 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:51.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:51.516000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:51.516000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001684580 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:51.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:51.516000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:40:51.516000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016845a0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:40:51.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:40:51.667231 systemd-networkd[1025]: cali4de9519a15c: Gained IPv6LL May 8 00:40:51.839630 env[1200]: time="2025-05-08T00:40:51.839546969Z" level=info msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" May 8 00:40:51.851721 env[1200]: time="2025-05-08T00:40:51.851544393Z" level=info msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" May 8 00:40:51.852305 env[1200]: time="2025-05-08T00:40:51.852137570Z" level=info msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" May 8 00:40:52.051252 systemd-networkd[1025]: calibb5bd1f775a: Gained IPv6LL May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" iface="eth0" netns="/var/run/netns/cni-23ff673b-4021-8505-5639-582839be9a74" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" iface="eth0" netns="/var/run/netns/cni-23ff673b-4021-8505-5639-582839be9a74" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" iface="eth0" netns="/var/run/netns/cni-23ff673b-4021-8505-5639-582839be9a74" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:51.892 [INFO][3665] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.003 [INFO][3838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.003 [INFO][3838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.004 [INFO][3838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.149 [WARNING][3838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.150 [INFO][3838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.158 [INFO][3838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.162432 env[1200]: 2025-05-08 00:40:52.160 [INFO][3665] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:40:52.165414 systemd[1]: run-netns-cni\x2d23ff673b\x2d4021\x2d8505\x2d5639\x2d582839be9a74.mount: Deactivated successfully. May 8 00:40:52.166476 env[1200]: time="2025-05-08T00:40:52.166438542Z" level=info msg="TearDown network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" successfully" May 8 00:40:52.166593 env[1200]: time="2025-05-08T00:40:52.166564586Z" level=info msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" returns successfully" May 8 00:40:52.167466 kubelet[1956]: E0508 00:40:52.167195 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:52.167837 env[1200]: time="2025-05-08T00:40:52.167780448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9z4wn,Uid:a54d3460-718f-4407-98c3-b431319cb589,Namespace:kube-system,Attempt:1,}" May 8 00:40:52.175525 systemd[1]: Started sshd@10-10.0.0.23:22-10.0.0.1:54908.service. May 8 00:40:52.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:54908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:52.176958 kernel: kauditd_printk_skb: 672 callbacks suppressed May 8 00:40:52.177045 kernel: audit: type=1130 audit(1746664852.174:1188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:54908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.159 [WARNING][3781] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5", Pod:"calico-apiserver-8648d74b4f-nn8fk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4de9519a15c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.159 [INFO][3781] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.159 [INFO][3781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" iface="eth0" netns="" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.159 [INFO][3781] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.159 [INFO][3781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.190 [INFO][3862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.190 [INFO][3862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.190 [INFO][3862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.201 [WARNING][3862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.201 [INFO][3862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.203 [INFO][3862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.208922 env[1200]: 2025-05-08 00:40:52.205 [INFO][3781] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.208922 env[1200]: time="2025-05-08T00:40:52.207211991Z" level=info msg="TearDown network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" successfully" May 8 00:40:52.208922 env[1200]: time="2025-05-08T00:40:52.207257458Z" level=info msg="StopPodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" returns successfully" May 8 00:40:52.208922 env[1200]: time="2025-05-08T00:40:52.207966149Z" level=info msg="RemovePodSandbox for \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" May 8 00:40:52.208922 env[1200]: time="2025-05-08T00:40:52.207995836Z" level=info msg="Forcibly stopping sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\"" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.149 [INFO][3821] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.149 [INFO][3821] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" iface="eth0" netns="/var/run/netns/cni-bb14b275-5338-59e9-8798-0b8f1146372a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.149 [INFO][3821] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" iface="eth0" netns="/var/run/netns/cni-bb14b275-5338-59e9-8798-0b8f1146372a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.150 [INFO][3821] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" iface="eth0" netns="/var/run/netns/cni-bb14b275-5338-59e9-8798-0b8f1146372a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.150 [INFO][3821] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.150 [INFO][3821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.205 [INFO][3851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.205 [INFO][3851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.205 [INFO][3851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.213 [WARNING][3851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.213 [INFO][3851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.215 [INFO][3851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.219653 env[1200]: 2025-05-08 00:40:52.218 [INFO][3821] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:40:52.222399 systemd[1]: run-netns-cni\x2dbb14b275\x2d5338\x2d59e9\x2d8798\x2d0b8f1146372a.mount: Deactivated successfully. May 8 00:40:52.223934 env[1200]: time="2025-05-08T00:40:52.223893584Z" level=info msg="TearDown network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" successfully" May 8 00:40:52.224056 env[1200]: time="2025-05-08T00:40:52.224013245Z" level=info msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" returns successfully" May 8 00:40:52.224373 kubelet[1956]: E0508 00:40:52.224342 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:52.226132 env[1200]: time="2025-05-08T00:40:52.226108948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qww7p,Uid:0b5352dd-133d-49d5-bee4-b3ab69bc975c,Namespace:kube-system,Attempt:1,}" May 8 00:40:52.237084 kernel: audit: type=1101 audit(1746664852.230:1189): pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.230000 audit[3870]: USER_ACCT pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.148 [INFO][3820] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.148 [INFO][3820] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" iface="eth0" netns="/var/run/netns/cni-9af7c265-5a8c-6cbc-4bf3-53d88412477f" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.148 [INFO][3820] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" iface="eth0" netns="/var/run/netns/cni-9af7c265-5a8c-6cbc-4bf3-53d88412477f" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.149 [INFO][3820] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" iface="eth0" netns="/var/run/netns/cni-9af7c265-5a8c-6cbc-4bf3-53d88412477f" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.149 [INFO][3820] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.149 [INFO][3820] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.198 [INFO][3849] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.198 [INFO][3849] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.215 [INFO][3849] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.225 [WARNING][3849] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.225 [INFO][3849] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.227 [INFO][3849] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.237544 env[1200]: 2025-05-08 00:40:52.229 [INFO][3820] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:40:52.238671 sshd[3870]: Accepted publickey for core from 10.0.0.1 port 54908 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:52.237000 audit[3870]: CRED_ACQ pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.237571 systemd[1]: run-netns-cni\x2d9af7c265\x2d5a8c\x2d6cbc\x2d4bf3\x2d53d88412477f.mount: Deactivated successfully. May 8 00:40:52.240697 sshd[3870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:52.244428 env[1200]: time="2025-05-08T00:40:52.243866442Z" level=info msg="TearDown network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" successfully" May 8 00:40:52.244428 env[1200]: time="2025-05-08T00:40:52.244421655Z" level=info msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" returns successfully" May 8 00:40:52.245670 kernel: audit: type=1103 audit(1746664852.237:1190): pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.245786 kernel: audit: type=1006 audit(1746664852.237:1191): pid=3870 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 8 00:40:52.251735 kernel: audit: type=1300 audit(1746664852.237:1191): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84366c40 a2=3 a3=0 items=0 ppid=1 pid=3870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.251783 kernel: audit: type=1327 audit(1746664852.237:1191): proctitle=737368643A20636F7265205B707269765D May 8 00:40:52.237000 audit[3870]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84366c40 a2=3 a3=0 items=0 ppid=1 pid=3870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:52.251945 env[1200]: time="2025-05-08T00:40:52.248489543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65bb755b6d-bp9hs,Uid:4c61ef1f-41e0-4e37-971a-16e5f90dc7ff,Namespace:calico-system,Attempt:1,}" May 8 00:40:52.247936 systemd-logind[1189]: New session 11 of user core. May 8 00:40:52.249595 systemd[1]: Started session-11.scope. May 8 00:40:52.260000 audit[3870]: USER_START pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.262000 audit[3914]: CRED_ACQ pid=3914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.287470 kernel: audit: type=1105 audit(1746664852.260:1192): pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.287540 kernel: audit: type=1103 audit(1746664852.262:1193): pid=3914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.355 [WARNING][3908] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"57afaea9-3e1b-43e3-9dd7-fb7e57a9a47d", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5", Pod:"calico-apiserver-8648d74b4f-nn8fk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4de9519a15c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.357 [INFO][3908] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.357 [INFO][3908] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" iface="eth0" netns="" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.357 [INFO][3908] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.357 [INFO][3908] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.387 [INFO][3926] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.387 [INFO][3926] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.387 [INFO][3926] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.398 [WARNING][3926] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.398 [INFO][3926] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" HandleID="k8s-pod-network.c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" Workload="localhost-k8s-calico--apiserver--8648d74b4f--nn8fk-eth0" May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.400 [INFO][3926] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.404449 env[1200]: 2025-05-08 00:40:52.401 [INFO][3908] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3" May 8 00:40:52.404449 env[1200]: time="2025-05-08T00:40:52.403509090Z" level=info msg="TearDown network for sandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" successfully" May 8 00:40:52.422000 audit[3870]: USER_END pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.422111 sshd[3870]: pam_unix(sshd:session): session closed for user core May 8 00:40:52.424583 systemd[1]: sshd@10-10.0.0.23:22-10.0.0.1:54908.service: Deactivated successfully. May 8 00:40:52.425303 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:40:52.426517 systemd-logind[1189]: Session 11 logged out. Waiting for processes to exit. May 8 00:40:52.427305 systemd-logind[1189]: Removed session 11. May 8 00:40:52.422000 audit[3870]: CRED_DISP pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.447376 kernel: audit: type=1106 audit(1746664852.422:1194): pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.447444 kernel: audit: type=1104 audit(1746664852.422:1195): pid=3870 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:52.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:54908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:52.564328 env[1200]: time="2025-05-08T00:40:52.564265832Z" level=info msg="RemovePodSandbox \"c3b9aab6d2fb34dddd66dbff7f501e103c3738817fc0b5a14baf242a01ac93a3\" returns successfully" May 8 00:40:52.567869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:40:52.567936 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califdfc5eaf901: link becomes ready May 8 00:40:52.568300 env[1200]: time="2025-05-08T00:40:52.568242432Z" level=info msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" May 8 00:40:52.574443 systemd-networkd[1025]: califdfc5eaf901: Link UP May 8 00:40:52.574655 systemd-networkd[1025]: califdfc5eaf901: Gained carrier May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.352 [INFO][3876] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0 coredns-668d6bf9bc- kube-system a54d3460-718f-4407-98c3-b431319cb589 947 0 2025-05-08 00:39:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-9z4wn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califdfc5eaf901 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.352 [INFO][3876] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.382 [INFO][3928] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" HandleID="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.402 [INFO][3928] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" HandleID="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005b23b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-9z4wn", "timestamp":"2025-05-08 00:40:52.382550174 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.402 [INFO][3928] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.402 [INFO][3928] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.402 [INFO][3928] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.404 [INFO][3928] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.408 [INFO][3928] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.415 [INFO][3928] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.417 [INFO][3928] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.419 [INFO][3928] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.419 [INFO][3928] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.420 [INFO][3928] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530 May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.555 [INFO][3928] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.561 [INFO][3928] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.561 [INFO][3928] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" host="localhost" May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.561 [INFO][3928] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.592083 env[1200]: 2025-05-08 00:40:52.561 [INFO][3928] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" HandleID="k8s-pod-network.6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.563 [INFO][3876] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a54d3460-718f-4407-98c3-b431319cb589", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-9z4wn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdfc5eaf901", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.563 [INFO][3876] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.563 [INFO][3876] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califdfc5eaf901 ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.567 [INFO][3876] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.576 [INFO][3876] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a54d3460-718f-4407-98c3-b431319cb589", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530", Pod:"coredns-668d6bf9bc-9z4wn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdfc5eaf901", MAC:"a2:1c:bd:8c:6b:4a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:52.592802 env[1200]: 2025-05-08 00:40:52.589 [INFO][3876] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530" Namespace="kube-system" Pod="coredns-668d6bf9bc-9z4wn" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:40:52.600000 audit[3976]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:52.600000 audit[3976]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fffd017a750 a2=0 a3=7fffd017a73c items=0 ppid=3336 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:52.678474 env[1200]: time="2025-05-08T00:40:52.678317523Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:52.678650 env[1200]: time="2025-05-08T00:40:52.678367360Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:52.678650 env[1200]: time="2025-05-08T00:40:52.678377669Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:52.679614 env[1200]: time="2025-05-08T00:40:52.679567501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530 pid=4027 runtime=io.containerd.runc.v2 May 8 00:40:52.690093 systemd[1]: Started cri-containerd-6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530.scope. May 8 00:40:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.704000 audit: BPF prog-id=166 op=LOAD May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333362313832333565363539326265663034666531313335626566 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333362313832333565363539326265663034666531313335626566 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.705000 audit: BPF prog-id=167 op=LOAD May 8 00:40:52.705000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a5a70 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333362313832333565363539326265663034666531313335626566 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit: BPF prog-id=168 op=LOAD May 8 00:40:52.706000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a5ab8 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333362313832333565363539326265663034666531313335626566 May 8 00:40:52.706000 audit: BPF prog-id=168 op=UNLOAD May 8 00:40:52.706000 audit: BPF prog-id=167 op=UNLOAD May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:52.706000 audit: BPF prog-id=169 op=LOAD May 8 00:40:52.706000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a5ec8 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:52.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662333362313832333565363539326265663034666531313335626566 May 8 00:40:52.708274 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.633 [WARNING][3963] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--lxwb2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f3f0bd-aa76-43d9-9627-17698227048d", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4", Pod:"csi-node-driver-lxwb2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb5bd1f775a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.633 [INFO][3963] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.634 [INFO][3963] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" iface="eth0" netns="" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.634 [INFO][3963] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.634 [INFO][3963] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.660 [INFO][4009] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.660 [INFO][4009] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.660 [INFO][4009] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.709 [WARNING][4009] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.709 [INFO][4009] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.711 [INFO][4009] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:52.716987 env[1200]: 2025-05-08 00:40:52.713 [INFO][3963] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:52.717769 env[1200]: time="2025-05-08T00:40:52.717720040Z" level=info msg="TearDown network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" successfully" May 8 00:40:52.717876 env[1200]: time="2025-05-08T00:40:52.717853088Z" level=info msg="StopPodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" returns successfully" May 8 00:40:52.718461 env[1200]: time="2025-05-08T00:40:52.718440573Z" level=info msg="RemovePodSandbox for \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" May 8 00:40:52.718624 env[1200]: time="2025-05-08T00:40:52.718562419Z" level=info msg="Forcibly stopping sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\"" May 8 00:40:52.742789 env[1200]: time="2025-05-08T00:40:52.742717737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9z4wn,Uid:a54d3460-718f-4407-98c3-b431319cb589,Namespace:kube-system,Attempt:1,} returns sandbox id \"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530\"" May 8 00:40:52.744862 kubelet[1956]: E0508 00:40:52.743657 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:52.747931 env[1200]: time="2025-05-08T00:40:52.747891964Z" level=info msg="CreateContainer within sandbox \"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:40:52.850582 env[1200]: time="2025-05-08T00:40:52.850531284Z" level=info msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.848 [WARNING][4087] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--lxwb2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f3f0bd-aa76-43d9-9627-17698227048d", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4", Pod:"csi-node-driver-lxwb2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb5bd1f775a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.849 [INFO][4087] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.849 [INFO][4087] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" iface="eth0" netns="" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.849 [INFO][4087] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.849 [INFO][4087] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.870 [INFO][4101] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.870 [INFO][4101] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:52.870 [INFO][4101] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:53.006 [WARNING][4101] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:53.006 [INFO][4101] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" HandleID="k8s-pod-network.1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" Workload="localhost-k8s-csi--node--driver--lxwb2-eth0" May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:53.008 [INFO][4101] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:53.011425 env[1200]: 2025-05-08 00:40:53.009 [INFO][4087] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157" May 8 00:40:53.012010 env[1200]: time="2025-05-08T00:40:53.011973274Z" level=info msg="TearDown network for sandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" successfully" May 8 00:40:53.336725 systemd-networkd[1025]: calic363d4ace3c: Link UP May 8 00:40:53.379700 systemd-networkd[1025]: calic363d4ace3c: Gained carrier May 8 00:40:53.380144 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic363d4ace3c: link becomes ready May 8 00:40:53.417443 env[1200]: time="2025-05-08T00:40:53.417302691Z" level=info msg="RemovePodSandbox \"1799dc604953d7646ad9a6156e920435bcb214c4055cdf7f81017b786efce157\" returns successfully" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:52.712 [INFO][3977] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--qww7p-eth0 coredns-668d6bf9bc- kube-system 0b5352dd-133d-49d5-bee4-b3ab69bc975c 953 0 2025-05-08 00:39:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-qww7p eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic363d4ace3c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:52.712 [INFO][3977] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:52.771 [INFO][4067] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" HandleID="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.005 [INFO][4067] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" HandleID="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011c4c0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-qww7p", "timestamp":"2025-05-08 00:40:52.771192949 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.006 [INFO][4067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.008 [INFO][4067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.008 [INFO][4067] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.011 [INFO][4067] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.073 [INFO][4067] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.079 [INFO][4067] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.081 [INFO][4067] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.084 [INFO][4067] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.084 [INFO][4067] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.086 [INFO][4067] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.262 [INFO][4067] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.331 [INFO][4067] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.331 [INFO][4067] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" host="localhost" May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.332 [INFO][4067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:53.547172 env[1200]: 2025-05-08 00:40:53.332 [INFO][4067] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" HandleID="k8s-pod-network.66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.333 [INFO][3977] cni-plugin/k8s.go 386: Populated endpoint ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qww7p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b5352dd-133d-49d5-bee4-b3ab69bc975c", ResourceVersion:"953", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-qww7p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic363d4ace3c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.334 [INFO][3977] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.334 [INFO][3977] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic363d4ace3c ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.379 [INFO][3977] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.380 [INFO][3977] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qww7p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b5352dd-133d-49d5-bee4-b3ab69bc975c", ResourceVersion:"953", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a", Pod:"coredns-668d6bf9bc-qww7p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic363d4ace3c", MAC:"16:0b:01:bb:58:59", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:53.547774 env[1200]: 2025-05-08 00:40:53.544 [INFO][3977] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a" Namespace="kube-system" Pod="coredns-668d6bf9bc-qww7p" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:40:53.557000 audit[4164]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=4164 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:53.557000 audit[4164]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffcc422cf70 a2=0 a3=7ffcc422cf5c items=0 ppid=3336 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.557000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:53.723101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2474166826.mount: Deactivated successfully. May 8 00:40:53.744110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount326613752.mount: Deactivated successfully. May 8 00:40:53.762611 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:40:53.762738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4c6c52618cb: link becomes ready May 8 00:40:53.762647 systemd-networkd[1025]: cali4c6c52618cb: Link UP May 8 00:40:53.762841 systemd-networkd[1025]: cali4c6c52618cb: Gained carrier May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:52.712 [INFO][3990] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0 calico-kube-controllers-65bb755b6d- calico-system 4c61ef1f-41e0-4e37-971a-16e5f90dc7ff 952 0 2025-05-08 00:40:05 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65bb755b6d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-65bb755b6d-bp9hs eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4c6c52618cb [] []}} ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:52.712 [INFO][3990] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:52.766 [INFO][4057] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" HandleID="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.006 [INFO][4057] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" HandleID="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00019c680), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-65bb755b6d-bp9hs", "timestamp":"2025-05-08 00:40:52.766343731 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.006 [INFO][4057] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.332 [INFO][4057] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.332 [INFO][4057] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.335 [INFO][4057] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.477 [INFO][4057] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.549 [INFO][4057] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.551 [INFO][4057] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.553 [INFO][4057] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.554 [INFO][4057] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.555 [INFO][4057] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.711 [INFO][4057] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.756 [INFO][4057] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.756 [INFO][4057] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" host="localhost" May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.757 [INFO][4057] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:53.849832 env[1200]: 2025-05-08 00:40:53.757 [INFO][4057] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" HandleID="k8s-pod-network.c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.758 [INFO][3990] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0", GenerateName:"calico-kube-controllers-65bb755b6d-", Namespace:"calico-system", SelfLink:"", UID:"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65bb755b6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-65bb755b6d-bp9hs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4c6c52618cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.758 [INFO][3990] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.758 [INFO][3990] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4c6c52618cb ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.762 [INFO][3990] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.763 [INFO][3990] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0", GenerateName:"calico-kube-controllers-65bb755b6d-", Namespace:"calico-system", SelfLink:"", UID:"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65bb755b6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c", Pod:"calico-kube-controllers-65bb755b6d-bp9hs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4c6c52618cb", MAC:"72:af:10:27:e7:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:53.850573 env[1200]: 2025-05-08 00:40:53.847 [INFO][3990] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c" Namespace="calico-system" Pod="calico-kube-controllers-65bb755b6d-bp9hs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.071 [INFO][4127] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.071 [INFO][4127] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" iface="eth0" netns="/var/run/netns/cni-8793e372-912f-cef4-6b5e-6047b80cd381" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.072 [INFO][4127] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" iface="eth0" netns="/var/run/netns/cni-8793e372-912f-cef4-6b5e-6047b80cd381" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.072 [INFO][4127] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" iface="eth0" netns="/var/run/netns/cni-8793e372-912f-cef4-6b5e-6047b80cd381" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.072 [INFO][4127] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.072 [INFO][4127] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.091 [INFO][4142] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.091 [INFO][4142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.757 [INFO][4142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.793 [WARNING][4142] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.793 [INFO][4142] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.846 [INFO][4142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:53.851223 env[1200]: 2025-05-08 00:40:53.848 [INFO][4127] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:40:53.851864 env[1200]: time="2025-05-08T00:40:53.851814701Z" level=info msg="TearDown network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" successfully" May 8 00:40:53.851983 env[1200]: time="2025-05-08T00:40:53.851958168Z" level=info msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" returns successfully" May 8 00:40:53.856403 env[1200]: time="2025-05-08T00:40:53.856360815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-wxqtb,Uid:b03d252a-cc0d-4923-bef4-402eb924aa23,Namespace:calico-apiserver,Attempt:1,}" May 8 00:40:53.859111 env[1200]: time="2025-05-08T00:40:53.859043640Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:53.859322 env[1200]: time="2025-05-08T00:40:53.859094358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:53.859322 env[1200]: time="2025-05-08T00:40:53.859111151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:53.859322 env[1200]: time="2025-05-08T00:40:53.859279796Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a pid=4175 runtime=io.containerd.runc.v2 May 8 00:40:53.860000 audit[4189]: NETFILTER_CFG table=filter:105 family=2 entries=52 op=nft_register_chain pid=4189 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:53.860000 audit[4189]: SYSCALL arch=c000003e syscall=46 success=yes exit=25056 a0=3 a1=7fffe28452e0 a2=0 a3=7fffe28452cc items=0 ppid=3336 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:53.871080 systemd[1]: Started cri-containerd-66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a.scope. May 8 00:40:53.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.881000 audit: BPF prog-id=170 op=LOAD May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4175 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653135313837346465613236366638623561333836376263393162 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4175 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653135313837346465613236366638623561333836376263393162 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit: BPF prog-id=171 op=LOAD May 8 00:40:53.882000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a2350 items=0 ppid=4175 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653135313837346465613236366638623561333836376263393162 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit: BPF prog-id=172 op=LOAD May 8 00:40:53.882000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a2398 items=0 ppid=4175 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653135313837346465613236366638623561333836376263393162 May 8 00:40:53.882000 audit: BPF prog-id=172 op=UNLOAD May 8 00:40:53.882000 audit: BPF prog-id=171 op=UNLOAD May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:53.882000 audit: BPF prog-id=173 op=LOAD May 8 00:40:53.882000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a27a8 items=0 ppid=4175 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:53.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653135313837346465613236366638623561333836376263393162 May 8 00:40:53.884617 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:53.910516 env[1200]: time="2025-05-08T00:40:53.910436344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qww7p,Uid:0b5352dd-133d-49d5-bee4-b3ab69bc975c,Namespace:kube-system,Attempt:1,} returns sandbox id \"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a\"" May 8 00:40:53.911322 kubelet[1956]: E0508 00:40:53.911139 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:53.912739 env[1200]: time="2025-05-08T00:40:53.912712392Z" level=info msg="CreateContainer within sandbox \"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:40:53.970983 env[1200]: time="2025-05-08T00:40:53.970889957Z" level=info msg="CreateContainer within sandbox \"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d556e666e833bdc8eb731f6a8d6ec32ba02cc2fb3ee24cb98ef9895bed7bce39\"" May 8 00:40:53.971590 env[1200]: time="2025-05-08T00:40:53.971546826Z" level=info msg="StartContainer for \"d556e666e833bdc8eb731f6a8d6ec32ba02cc2fb3ee24cb98ef9895bed7bce39\"" May 8 00:40:53.979345 env[1200]: time="2025-05-08T00:40:53.978711311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:53.979345 env[1200]: time="2025-05-08T00:40:53.978755737Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:53.979345 env[1200]: time="2025-05-08T00:40:53.978767721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:53.979345 env[1200]: time="2025-05-08T00:40:53.978972255Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c pid=4232 runtime=io.containerd.runc.v2 May 8 00:40:53.993708 systemd[1]: Started cri-containerd-d556e666e833bdc8eb731f6a8d6ec32ba02cc2fb3ee24cb98ef9895bed7bce39.scope. May 8 00:40:54.000373 env[1200]: time="2025-05-08T00:40:54.000321943Z" level=info msg="CreateContainer within sandbox \"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e7b16e3669f1bf224c8fe99b3aa27d5cf35e1e92b5f2472a1ba36b85172ba275\"" May 8 00:40:54.002139 systemd[1]: Started cri-containerd-c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c.scope. May 8 00:40:54.003407 env[1200]: time="2025-05-08T00:40:54.003374137Z" level=info msg="StartContainer for \"e7b16e3669f1bf224c8fe99b3aa27d5cf35e1e92b5f2472a1ba36b85172ba275\"" May 8 00:40:54.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.018000 audit: BPF prog-id=174 op=LOAD May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4027 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353665363636653833336264633865623733316636613864366563 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4027 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353665363636653833336264633865623733316636613864366563 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit: BPF prog-id=175 op=LOAD May 8 00:40:54.019000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00034fd10 items=0 ppid=4027 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353665363636653833336264633865623733316636613864366563 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit: BPF prog-id=176 op=LOAD May 8 00:40:54.019000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00034fd58 items=0 ppid=4027 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353665363636653833336264633865623733316636613864366563 May 8 00:40:54.019000 audit: BPF prog-id=176 op=UNLOAD May 8 00:40:54.019000 audit: BPF prog-id=175 op=UNLOAD May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.019000 audit: BPF prog-id=177 op=LOAD May 8 00:40:54.019000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039e168 items=0 ppid=4027 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353665363636653833336264633865623733316636613864366563 May 8 00:40:54.024351 systemd[1]: Started cri-containerd-e7b16e3669f1bf224c8fe99b3aa27d5cf35e1e92b5f2472a1ba36b85172ba275.scope. May 8 00:40:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.026000 audit: BPF prog-id=178 op=LOAD May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4232 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646262316239613134653332303535346661313830393333636636 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4232 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646262316239613134653332303535346661313830393333636636 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit: BPF prog-id=179 op=LOAD May 8 00:40:54.027000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028b180 items=0 ppid=4232 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646262316239613134653332303535346661313830393333636636 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit: BPF prog-id=180 op=LOAD May 8 00:40:54.027000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028b1c8 items=0 ppid=4232 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646262316239613134653332303535346661313830393333636636 May 8 00:40:54.027000 audit: BPF prog-id=180 op=UNLOAD May 8 00:40:54.027000 audit: BPF prog-id=179 op=UNLOAD May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.027000 audit: BPF prog-id=181 op=LOAD May 8 00:40:54.027000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028b5d8 items=0 ppid=4232 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646262316239613134653332303535346661313830393333636636 May 8 00:40:54.030306 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit: BPF prog-id=182 op=LOAD May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4175 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623136653336363966316266323234633866653939623361613237 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4175 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623136653336363966316266323234633866653939623361613237 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.041000 audit: BPF prog-id=183 op=LOAD May 8 00:40:54.041000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000256a0 items=0 ppid=4175 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623136653336363966316266323234633866653939623361613237 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit: BPF prog-id=184 op=LOAD May 8 00:40:54.042000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000256e8 items=0 ppid=4175 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623136653336363966316266323234633866653939623361613237 May 8 00:40:54.042000 audit: BPF prog-id=184 op=UNLOAD May 8 00:40:54.042000 audit: BPF prog-id=183 op=UNLOAD May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.042000 audit: BPF prog-id=185 op=LOAD May 8 00:40:54.042000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025af8 items=0 ppid=4175 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623136653336363966316266323234633866653939623361613237 May 8 00:40:54.063278 env[1200]: time="2025-05-08T00:40:54.063213410Z" level=info msg="StartContainer for \"d556e666e833bdc8eb731f6a8d6ec32ba02cc2fb3ee24cb98ef9895bed7bce39\" returns successfully" May 8 00:40:54.067569 env[1200]: time="2025-05-08T00:40:54.067534163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65bb755b6d-bp9hs,Uid:4c61ef1f-41e0-4e37-971a-16e5f90dc7ff,Namespace:calico-system,Attempt:1,} returns sandbox id \"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c\"" May 8 00:40:54.076599 env[1200]: time="2025-05-08T00:40:54.076543489Z" level=info msg="StartContainer for \"e7b16e3669f1bf224c8fe99b3aa27d5cf35e1e92b5f2472a1ba36b85172ba275\" returns successfully" May 8 00:40:54.142779 kubelet[1956]: E0508 00:40:54.142726 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:54.156718 kubelet[1956]: E0508 00:40:54.151504 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:54.170743 systemd[1]: run-netns-cni\x2d8793e372\x2d912f\x2dcef4\x2d6b5e\x2d6047b80cd381.mount: Deactivated successfully. May 8 00:40:54.188304 kubelet[1956]: I0508 00:40:54.187949 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-9z4wn" podStartSLOduration=57.18792827 podStartE2EDuration="57.18792827s" podCreationTimestamp="2025-05-08 00:39:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:40:54.161934319 +0000 UTC m=+62.411775134" watchObservedRunningTime="2025-05-08 00:40:54.18792827 +0000 UTC m=+62.437769085" May 8 00:40:54.235378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2caed97fd40: link becomes ready May 8 00:40:54.225970 systemd-networkd[1025]: cali2caed97fd40: Link UP May 8 00:40:54.231416 systemd-networkd[1025]: cali2caed97fd40: Gained carrier May 8 00:40:54.231549 systemd-networkd[1025]: califdfc5eaf901: Gained IPv6LL May 8 00:40:54.252194 kubelet[1956]: I0508 00:40:54.251974 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-qww7p" podStartSLOduration=57.251950881 podStartE2EDuration="57.251950881s" podCreationTimestamp="2025-05-08 00:39:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:40:54.189194255 +0000 UTC m=+62.439035090" watchObservedRunningTime="2025-05-08 00:40:54.251950881 +0000 UTC m=+62.501791696" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.090 [INFO][4283] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0 calico-apiserver-8648d74b4f- calico-apiserver b03d252a-cc0d-4923-bef4-402eb924aa23 965 0 2025-05-08 00:40:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8648d74b4f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8648d74b4f-wxqtb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2caed97fd40 [] []}} ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.090 [INFO][4283] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.122 [INFO][4339] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" HandleID="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.131 [INFO][4339] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" HandleID="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd310), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8648d74b4f-wxqtb", "timestamp":"2025-05-08 00:40:54.122157224 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.131 [INFO][4339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.131 [INFO][4339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.131 [INFO][4339] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.135 [INFO][4339] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.163 [INFO][4339] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.178 [INFO][4339] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.181 [INFO][4339] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.189 [INFO][4339] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.189 [INFO][4339] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.194 [INFO][4339] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.203 [INFO][4339] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.216 [INFO][4339] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.216 [INFO][4339] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" host="localhost" May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.216 [INFO][4339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:40:54.255405 env[1200]: 2025-05-08 00:40:54.216 [INFO][4339] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" HandleID="k8s-pod-network.4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.219 [INFO][4283] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"b03d252a-cc0d-4923-bef4-402eb924aa23", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8648d74b4f-wxqtb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2caed97fd40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.219 [INFO][4283] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.219 [INFO][4283] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2caed97fd40 ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.226 [INFO][4283] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.226 [INFO][4283] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"b03d252a-cc0d-4923-bef4-402eb924aa23", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c", Pod:"calico-apiserver-8648d74b4f-wxqtb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2caed97fd40", MAC:"c2:ab:8a:81:29:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:40:54.256357 env[1200]: 2025-05-08 00:40:54.251 [INFO][4283] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c" Namespace="calico-apiserver" Pod="calico-apiserver-8648d74b4f-wxqtb" WorkloadEndpoint="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:40:54.277000 audit[4358]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:40:54.277000 audit[4358]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffc12b97030 a2=0 a3=7ffc12b9701c items=0 ppid=3336 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.277000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:40:54.290000 audit[4308]: AVC avc: denied { getattr } for pid=4308 comm="coredns" path="cgroup:[4026532663]" dev="nsfs" ino=4026532663 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c199 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:40:54.290000 audit[4268]: AVC avc: denied { getattr } for pid=4268 comm="coredns" path="cgroup:[4026532656]" dev="nsfs" ino=4026532656 scontext=system_u:system_r:svirt_lxc_net_t:s0:c508,c712 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:40:54.290000 audit[4268]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0000d4900 a2=c0000f2d38 a3=0 items=0 ppid=4027 pid=4268 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c508,c712 key=(null) May 8 00:40:54.290000 audit[4308]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c000614928 a3=0 items=0 ppid=4175 pid=4308 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c199 key=(null) May 8 00:40:54.290000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:40:54.290000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:40:54.305378 env[1200]: time="2025-05-08T00:40:54.305077892Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:54.305378 env[1200]: time="2025-05-08T00:40:54.305143680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:54.305378 env[1200]: time="2025-05-08T00:40:54.305157086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:54.305942 env[1200]: time="2025-05-08T00:40:54.305853410Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c pid=4376 runtime=io.containerd.runc.v2 May 8 00:40:54.341362 systemd[1]: Started cri-containerd-4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c.scope. May 8 00:40:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.352000 audit: BPF prog-id=186 op=LOAD May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4376 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373663633130653864303065343437663538633430636364613463 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4376 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373663633130653864303065343437663538633430636364613463 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit: BPF prog-id=187 op=LOAD May 8 00:40:54.353000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002dfff0 items=0 ppid=4376 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373663633130653864303065343437663538633430636364613463 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit: BPF prog-id=188 op=LOAD May 8 00:40:54.353000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000360038 items=0 ppid=4376 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373663633130653864303065343437663538633430636364613463 May 8 00:40:54.353000 audit: BPF prog-id=188 op=UNLOAD May 8 00:40:54.353000 audit: BPF prog-id=187 op=UNLOAD May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:54.353000 audit: BPF prog-id=189 op=LOAD May 8 00:40:54.353000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000360448 items=0 ppid=4376 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373663633130653864303065343437663538633430636364613463 May 8 00:40:54.355687 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:40:54.363000 audit[4406]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.363000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc479d65a0 a2=0 a3=7ffc479d658c items=0 ppid=2148 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.370000 audit[4406]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.370000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc479d65a0 a2=0 a3=0 items=0 ppid=2148 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.391707 env[1200]: time="2025-05-08T00:40:54.391638582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8648d74b4f-wxqtb,Uid:b03d252a-cc0d-4923-bef4-402eb924aa23,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c\"" May 8 00:40:54.414000 audit[4422]: NETFILTER_CFG table=filter:109 family=2 entries=16 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.414000 audit[4422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe79788630 a2=0 a3=7ffe7978861c items=0 ppid=2148 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.423000 audit[4422]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.423000 audit[4422]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe79788630 a2=0 a3=0 items=0 ppid=2148 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:55.154554 kubelet[1956]: E0508 00:40:55.154220 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:55.154554 kubelet[1956]: E0508 00:40:55.154455 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:55.253360 systemd-networkd[1025]: calic363d4ace3c: Gained IPv6LL May 8 00:40:55.380197 systemd-networkd[1025]: cali2caed97fd40: Gained IPv6LL May 8 00:40:55.436000 audit[4424]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:55.436000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff7d2628c0 a2=0 a3=7fff7d2628ac items=0 ppid=2148 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:55.451000 audit[4424]: NETFILTER_CFG table=nat:112 family=2 entries=47 op=nft_register_chain pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:55.451000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff7d2628c0 a2=0 a3=7fff7d2628ac items=0 ppid=2148 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:55.571206 systemd-networkd[1025]: cali4c6c52618cb: Gained IPv6LL May 8 00:40:55.713326 env[1200]: time="2025-05-08T00:40:55.713173960Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:55.716075 env[1200]: time="2025-05-08T00:40:55.716019050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:55.718290 env[1200]: time="2025-05-08T00:40:55.718252819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:55.720674 env[1200]: time="2025-05-08T00:40:55.720646918Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:55.721290 env[1200]: time="2025-05-08T00:40:55.721257466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:40:55.722500 env[1200]: time="2025-05-08T00:40:55.722463863Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:40:55.723617 env[1200]: time="2025-05-08T00:40:55.723583724Z" level=info msg="CreateContainer within sandbox \"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:40:55.742175 env[1200]: time="2025-05-08T00:40:55.742102554Z" level=info msg="CreateContainer within sandbox \"0979ccae3c7bcb47986af4cc173ffce64719671a54fc4700061e3c18a38e41c5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4567b3d7f8e97f6c7f8ecfe34e09e3d15e45baaf6c1f76262e5178a4a9e032db\"" May 8 00:40:55.742820 env[1200]: time="2025-05-08T00:40:55.742622678Z" level=info msg="StartContainer for \"4567b3d7f8e97f6c7f8ecfe34e09e3d15e45baaf6c1f76262e5178a4a9e032db\"" May 8 00:40:55.766482 systemd[1]: Started cri-containerd-4567b3d7f8e97f6c7f8ecfe34e09e3d15e45baaf6c1f76262e5178a4a9e032db.scope. May 8 00:40:55.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit: BPF prog-id=190 op=LOAD May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3678 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363762336437663865393766366337663865636665333465303965 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3678 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363762336437663865393766366337663865636665333465303965 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.779000 audit: BPF prog-id=191 op=LOAD May 8 00:40:55.779000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003afd40 items=0 ppid=3678 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363762336437663865393766366337663865636665333465303965 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit: BPF prog-id=192 op=LOAD May 8 00:40:55.780000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003afd88 items=0 ppid=3678 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363762336437663865393766366337663865636665333465303965 May 8 00:40:55.780000 audit: BPF prog-id=192 op=UNLOAD May 8 00:40:55.780000 audit: BPF prog-id=191 op=UNLOAD May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:55.780000 audit: BPF prog-id=193 op=LOAD May 8 00:40:55.780000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000416198 items=0 ppid=3678 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363762336437663865393766366337663865636665333465303965 May 8 00:40:56.287000 env[1200]: time="2025-05-08T00:40:56.286925865Z" level=info msg="StartContainer for \"4567b3d7f8e97f6c7f8ecfe34e09e3d15e45baaf6c1f76262e5178a4a9e032db\" returns successfully" May 8 00:40:56.290588 kubelet[1956]: E0508 00:40:56.290553 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:56.291366 kubelet[1956]: E0508 00:40:56.291318 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:56.445000 audit[4466]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:56.445000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff16776ab0 a2=0 a3=7fff16776a9c items=0 ppid=2148 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:56.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:56.453000 audit[4466]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:56.453000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff16776ab0 a2=0 a3=7fff16776a9c items=0 ppid=2148 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:56.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:57.194000 audit[4444]: AVC avc: denied { watch } for pid=4444 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_40_34.841155388/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c381,c498 tclass=file permissive=0 May 8 00:40:57.252527 kernel: kauditd_printk_skb: 442 callbacks suppressed May 8 00:40:57.252654 kernel: audit: type=1400 audit(1746664857.194:1337): avc: denied { watch } for pid=4444 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_40_34.841155388/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c381,c498 tclass=file permissive=0 May 8 00:40:57.194000 audit[4444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f23a20 a2=fc6 a3=0 items=0 ppid=3678 pid=4444 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 key=(null) May 8 00:40:57.261852 kernel: audit: type=1300 audit(1746664857.194:1337): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f23a20 a2=fc6 a3=0 items=0 ppid=3678 pid=4444 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 key=(null) May 8 00:40:57.261907 kernel: audit: type=1327 audit(1746664857.194:1337): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:40:57.194000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:40:57.291585 kubelet[1956]: I0508 00:40:57.291549 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:40:57.292011 kubelet[1956]: E0508 00:40:57.291904 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:57.292011 kubelet[1956]: E0508 00:40:57.291904 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:57.428100 systemd[1]: Started sshd@11-10.0.0.23:22-10.0.0.1:54238.service. May 8 00:40:57.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:57.434055 kernel: audit: type=1130 audit(1746664857.428:1338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:57.721000 audit[4468]: USER_ACCT pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.721926 sshd[4468]: Accepted publickey for core from 10.0.0.1 port 54238 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:57.723000 audit[4468]: CRED_ACQ pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.735530 kernel: audit: type=1101 audit(1746664857.721:1339): pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.735595 kernel: audit: type=1103 audit(1746664857.723:1340): pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.735621 kernel: audit: type=1006 audit(1746664857.723:1341): pid=4468 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 8 00:40:57.723000 audit[4468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccad12d0 a2=3 a3=0 items=0 ppid=1 pid=4468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.741828 kernel: audit: type=1300 audit(1746664857.723:1341): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccad12d0 a2=3 a3=0 items=0 ppid=1 pid=4468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.741881 kernel: audit: type=1327 audit(1746664857.723:1341): proctitle=737368643A20636F7265205B707269765D May 8 00:40:57.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:57.743960 sshd[4468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:57.750056 systemd-logind[1189]: New session 12 of user core. May 8 00:40:57.750687 systemd[1]: Started session-12.scope. May 8 00:40:57.755000 audit[4468]: USER_START pid=4468 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.757000 audit[4470]: CRED_ACQ pid=4470 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.761343 kernel: audit: type=1105 audit(1746664857.755:1342): pid=4468 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.882896 sshd[4468]: pam_unix(sshd:session): session closed for user core May 8 00:40:57.884000 audit[4468]: USER_END pid=4468 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.884000 audit[4468]: CRED_DISP pid=4468 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:57.885521 systemd[1]: sshd@11-10.0.0.23:22-10.0.0.1:54238.service: Deactivated successfully. May 8 00:40:57.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:57.886385 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:40:57.886991 systemd-logind[1189]: Session 12 logged out. Waiting for processes to exit. May 8 00:40:57.887803 systemd-logind[1189]: Removed session 12. May 8 00:40:59.579195 env[1200]: time="2025-05-08T00:40:59.579117305Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:59.582877 env[1200]: time="2025-05-08T00:40:59.582814929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:59.584739 env[1200]: time="2025-05-08T00:40:59.584698182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:59.586405 env[1200]: time="2025-05-08T00:40:59.586346482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:59.587000 env[1200]: time="2025-05-08T00:40:59.586764377Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 8 00:40:59.588012 env[1200]: time="2025-05-08T00:40:59.587965398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:40:59.589150 env[1200]: time="2025-05-08T00:40:59.589107836Z" level=info msg="CreateContainer within sandbox \"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:40:59.607861 env[1200]: time="2025-05-08T00:40:59.607773735Z" level=info msg="CreateContainer within sandbox \"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"01088f660b1cea90cc02773864eb0e624d0e978b237142b9096a293f46cca555\"" May 8 00:40:59.608508 env[1200]: time="2025-05-08T00:40:59.608451899Z" level=info msg="StartContainer for \"01088f660b1cea90cc02773864eb0e624d0e978b237142b9096a293f46cca555\"" May 8 00:40:59.632254 systemd[1]: run-containerd-runc-k8s.io-01088f660b1cea90cc02773864eb0e624d0e978b237142b9096a293f46cca555-runc.hlWe2J.mount: Deactivated successfully. May 8 00:40:59.635149 systemd[1]: Started cri-containerd-01088f660b1cea90cc02773864eb0e624d0e978b237142b9096a293f46cca555.scope. May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb8958d52f8 items=0 ppid=3733 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031303838663636306231636561393063633032373733383634656230 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.650000 audit: BPF prog-id=194 op=LOAD May 8 00:40:59.650000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024f48 items=0 ppid=3733 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031303838663636306231636561393063633032373733383634656230 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit: BPF prog-id=195 op=LOAD May 8 00:40:59.651000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024f98 items=0 ppid=3733 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:59.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031303838663636306231636561393063633032373733383634656230 May 8 00:40:59.651000 audit: BPF prog-id=195 op=UNLOAD May 8 00:40:59.651000 audit: BPF prog-id=194 op=UNLOAD May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:59.651000 audit: BPF prog-id=196 op=LOAD May 8 00:40:59.651000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000025028 items=0 ppid=3733 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:59.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031303838663636306231636561393063633032373733383634656230 May 8 00:40:59.732491 env[1200]: time="2025-05-08T00:40:59.732412124Z" level=info msg="StartContainer for \"01088f660b1cea90cc02773864eb0e624d0e978b237142b9096a293f46cca555\" returns successfully" May 8 00:41:01.852875 kubelet[1956]: E0508 00:41:01.852804 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:02.889050 systemd[1]: Started sshd@12-10.0.0.23:22-10.0.0.1:54242.service. May 8 00:41:02.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.23:22-10.0.0.1:54242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:02.890251 kernel: kauditd_printk_skb: 47 callbacks suppressed May 8 00:41:02.890318 kernel: audit: type=1130 audit(1746664862.888:1353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.23:22-10.0.0.1:54242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:02.934000 audit[4527]: USER_ACCT pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.935581 sshd[4527]: Accepted publickey for core from 10.0.0.1 port 54242 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:02.963000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.965064 kernel: audit: type=1101 audit(1746664862.934:1354): pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.965120 kernel: audit: type=1103 audit(1746664862.963:1355): pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.965261 sshd[4527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:02.969798 systemd-logind[1189]: New session 13 of user core. May 8 00:41:02.970741 systemd[1]: Started session-13.scope. May 8 00:41:02.972324 kernel: audit: type=1006 audit(1746664862.963:1356): pid=4527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 8 00:41:02.972395 kernel: audit: type=1300 audit(1746664862.963:1356): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe86cbf660 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:02.963000 audit[4527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe86cbf660 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:02.977126 kernel: audit: type=1327 audit(1746664862.963:1356): proctitle=737368643A20636F7265205B707269765D May 8 00:41:02.963000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:02.972000 audit[4527]: USER_START pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.983818 kernel: audit: type=1105 audit(1746664862.972:1357): pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.983934 kernel: audit: type=1103 audit(1746664862.976:1358): pid=4529 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:02.976000 audit[4529]: CRED_ACQ pid=4529 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.250388 sshd[4527]: pam_unix(sshd:session): session closed for user core May 8 00:41:03.251000 audit[4527]: USER_END pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.254112 systemd[1]: sshd@12-10.0.0.23:22-10.0.0.1:54242.service: Deactivated successfully. May 8 00:41:03.254870 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:41:03.255642 systemd-logind[1189]: Session 13 logged out. Waiting for processes to exit. May 8 00:41:03.257229 systemd[1]: Started sshd@13-10.0.0.23:22-10.0.0.1:54254.service. May 8 00:41:03.251000 audit[4527]: CRED_DISP pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.259247 systemd-logind[1189]: Removed session 13. May 8 00:41:03.261864 kernel: audit: type=1106 audit(1746664863.251:1359): pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.261948 kernel: audit: type=1104 audit(1746664863.251:1360): pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.23:22-10.0.0.1:54242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:03.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.23:22-10.0.0.1:54254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:03.296000 audit[4541]: USER_ACCT pid=4541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.298091 sshd[4541]: Accepted publickey for core from 10.0.0.1 port 54254 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:03.298000 audit[4541]: CRED_ACQ pid=4541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.298000 audit[4541]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc05c20360 a2=3 a3=0 items=0 ppid=1 pid=4541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:03.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:03.300145 sshd[4541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:03.304391 systemd-logind[1189]: New session 14 of user core. May 8 00:41:03.305400 systemd[1]: Started session-14.scope. May 8 00:41:03.309000 audit[4541]: USER_START pid=4541 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.310000 audit[4543]: CRED_ACQ pid=4543 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.530208 sshd[4541]: pam_unix(sshd:session): session closed for user core May 8 00:41:03.530000 audit[4541]: USER_END pid=4541 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.530000 audit[4541]: CRED_DISP pid=4541 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.533649 systemd[1]: sshd@13-10.0.0.23:22-10.0.0.1:54254.service: Deactivated successfully. May 8 00:41:03.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.23:22-10.0.0.1:54254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:03.534459 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:41:03.535340 systemd-logind[1189]: Session 14 logged out. Waiting for processes to exit. May 8 00:41:03.536711 systemd[1]: Started sshd@14-10.0.0.23:22-10.0.0.1:54256.service. May 8 00:41:03.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.23:22-10.0.0.1:54256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:03.538100 systemd-logind[1189]: Removed session 14. May 8 00:41:03.577000 audit[4552]: USER_ACCT pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.578533 sshd[4552]: Accepted publickey for core from 10.0.0.1 port 54256 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:03.578000 audit[4552]: CRED_ACQ pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.578000 audit[4552]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd71ef60f0 a2=3 a3=0 items=0 ppid=1 pid=4552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:03.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:03.580277 sshd[4552]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:03.585580 systemd-logind[1189]: New session 15 of user core. May 8 00:41:03.589000 audit[4552]: USER_START pid=4552 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.586417 systemd[1]: Started session-15.scope. May 8 00:41:03.591000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.627833 env[1200]: time="2025-05-08T00:41:03.627743449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:03.711453 sshd[4552]: pam_unix(sshd:session): session closed for user core May 8 00:41:03.711000 audit[4552]: USER_END pid=4552 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.711000 audit[4552]: CRED_DISP pid=4552 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:03.714067 systemd[1]: sshd@14-10.0.0.23:22-10.0.0.1:54256.service: Deactivated successfully. May 8 00:41:03.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.23:22-10.0.0.1:54256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:03.714995 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:41:03.715584 systemd-logind[1189]: Session 15 logged out. Waiting for processes to exit. May 8 00:41:03.716389 systemd-logind[1189]: Removed session 15. May 8 00:41:04.121707 env[1200]: time="2025-05-08T00:41:04.121613532Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.189400 env[1200]: time="2025-05-08T00:41:04.189341577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.249652 env[1200]: time="2025-05-08T00:41:04.249581842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.250307 env[1200]: time="2025-05-08T00:41:04.250250084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 8 00:41:04.251668 env[1200]: time="2025-05-08T00:41:04.251619430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:41:04.268432 env[1200]: time="2025-05-08T00:41:04.268371967Z" level=info msg="CreateContainer within sandbox \"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:41:04.292395 env[1200]: time="2025-05-08T00:41:04.292331125Z" level=info msg="CreateContainer within sandbox \"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d5459af26a3234dec9d1207c468e0b46d7fa64458592ed0052f8690e9c1610fb\"" May 8 00:41:04.293114 env[1200]: time="2025-05-08T00:41:04.293011830Z" level=info msg="StartContainer for \"d5459af26a3234dec9d1207c468e0b46d7fa64458592ed0052f8690e9c1610fb\"" May 8 00:41:04.314950 systemd[1]: Started cri-containerd-d5459af26a3234dec9d1207c468e0b46d7fa64458592ed0052f8690e9c1610fb.scope. May 8 00:41:04.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit: BPF prog-id=197 op=LOAD May 8 00:41:04.329000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4232 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343539616632366133323334646563396431323037633436386530 May 8 00:41:04.329000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.329000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4232 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343539616632366133323334646563396431323037633436386530 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit: BPF prog-id=198 op=LOAD May 8 00:41:04.330000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243a0 items=0 ppid=4232 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343539616632366133323334646563396431323037633436386530 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit: BPF prog-id=199 op=LOAD May 8 00:41:04.330000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243e8 items=0 ppid=4232 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343539616632366133323334646563396431323037633436386530 May 8 00:41:04.330000 audit: BPF prog-id=199 op=UNLOAD May 8 00:41:04.330000 audit: BPF prog-id=198 op=UNLOAD May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.330000 audit: BPF prog-id=200 op=LOAD May 8 00:41:04.330000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247f8 items=0 ppid=4232 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343539616632366133323334646563396431323037633436386530 May 8 00:41:04.361109 env[1200]: time="2025-05-08T00:41:04.361003851Z" level=info msg="StartContainer for \"d5459af26a3234dec9d1207c468e0b46d7fa64458592ed0052f8690e9c1610fb\" returns successfully" May 8 00:41:04.630852 env[1200]: time="2025-05-08T00:41:04.630752821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.633272 env[1200]: time="2025-05-08T00:41:04.633230803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.634997 env[1200]: time="2025-05-08T00:41:04.634961181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.636624 env[1200]: time="2025-05-08T00:41:04.636559486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:04.637126 env[1200]: time="2025-05-08T00:41:04.637090856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:41:04.638445 env[1200]: time="2025-05-08T00:41:04.638219710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:41:04.639354 env[1200]: time="2025-05-08T00:41:04.639320281Z" level=info msg="CreateContainer within sandbox \"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:41:04.654349 env[1200]: time="2025-05-08T00:41:04.654271674Z" level=info msg="CreateContainer within sandbox \"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"dab6743956bdf8de5c2e687ea4ce29799a4ac479671120648233c62effe29d42\"" May 8 00:41:04.654861 env[1200]: time="2025-05-08T00:41:04.654829885Z" level=info msg="StartContainer for \"dab6743956bdf8de5c2e687ea4ce29799a4ac479671120648233c62effe29d42\"" May 8 00:41:04.671772 systemd[1]: Started cri-containerd-dab6743956bdf8de5c2e687ea4ce29799a4ac479671120648233c62effe29d42.scope. May 8 00:41:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.687000 audit: BPF prog-id=201 op=LOAD May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4376 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623637343339353662646638646535633265363837656134636532 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4376 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623637343339353662646638646535633265363837656134636532 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit: BPF prog-id=202 op=LOAD May 8 00:41:04.688000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025df0 items=0 ppid=4376 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623637343339353662646638646535633265363837656134636532 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.688000 audit: BPF prog-id=203 op=LOAD May 8 00:41:04.688000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000025e38 items=0 ppid=4376 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623637343339353662646638646535633265363837656134636532 May 8 00:41:04.689000 audit: BPF prog-id=203 op=UNLOAD May 8 00:41:04.689000 audit: BPF prog-id=202 op=UNLOAD May 8 00:41:04.689000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:04.689000 audit: BPF prog-id=204 op=LOAD May 8 00:41:04.689000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000364248 items=0 ppid=4376 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:04.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461623637343339353662646638646535633265363837656134636532 May 8 00:41:04.723280 env[1200]: time="2025-05-08T00:41:04.723228425Z" level=info msg="StartContainer for \"dab6743956bdf8de5c2e687ea4ce29799a4ac479671120648233c62effe29d42\" returns successfully" May 8 00:41:05.407117 kubelet[1956]: I0508 00:41:05.406924 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8648d74b4f-nn8fk" podStartSLOduration=56.803974149 podStartE2EDuration="1m1.40690691s" podCreationTimestamp="2025-05-08 00:40:04 +0000 UTC" firstStartedPulling="2025-05-08 00:40:51.119304195 +0000 UTC m=+59.369145010" lastFinishedPulling="2025-05-08 00:40:55.722236956 +0000 UTC m=+63.972077771" observedRunningTime="2025-05-08 00:40:56.423113924 +0000 UTC m=+64.672954769" watchObservedRunningTime="2025-05-08 00:41:05.40690691 +0000 UTC m=+73.656747725" May 8 00:41:05.579000 audit[4664]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.579000 audit[4664]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffec5ae4a80 a2=0 a3=7ffec5ae4a6c items=0 ppid=2148 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:05.582267 kubelet[1956]: I0508 00:41:05.581905 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65bb755b6d-bp9hs" podStartSLOduration=50.399234579 podStartE2EDuration="1m0.581876945s" podCreationTimestamp="2025-05-08 00:40:05 +0000 UTC" firstStartedPulling="2025-05-08 00:40:54.068658744 +0000 UTC m=+62.318499559" lastFinishedPulling="2025-05-08 00:41:04.2513011 +0000 UTC m=+72.501141925" observedRunningTime="2025-05-08 00:41:05.581343893 +0000 UTC m=+73.831184698" watchObservedRunningTime="2025-05-08 00:41:05.581876945 +0000 UTC m=+73.831717770" May 8 00:41:05.582267 kubelet[1956]: I0508 00:41:05.581988 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8648d74b4f-wxqtb" podStartSLOduration=51.337844072 podStartE2EDuration="1m1.581983038s" podCreationTimestamp="2025-05-08 00:40:04 +0000 UTC" firstStartedPulling="2025-05-08 00:40:54.39390642 +0000 UTC m=+62.643747225" lastFinishedPulling="2025-05-08 00:41:04.638045366 +0000 UTC m=+72.887886191" observedRunningTime="2025-05-08 00:41:05.408219384 +0000 UTC m=+73.658060199" watchObservedRunningTime="2025-05-08 00:41:05.581983038 +0000 UTC m=+73.831823843" May 8 00:41:05.585000 audit[4664]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.585000 audit[4664]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffec5ae4a80 a2=0 a3=7ffec5ae4a6c items=0 ppid=2148 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:06.315931 kubelet[1956]: I0508 00:41:06.315868 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:41:06.752000 audit[4622]: AVC avc: denied { watch } for pid=4622 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_40_34.109686985/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c829 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c779,c829 tclass=file permissive=0 May 8 00:41:06.752000 audit[4622]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000059420 a2=fc6 a3=0 items=0 ppid=4376 pid=4622 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c829 key=(null) May 8 00:41:06.752000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:41:07.350853 env[1200]: time="2025-05-08T00:41:07.350786847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:07.352733 env[1200]: time="2025-05-08T00:41:07.352684750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:07.355671 env[1200]: time="2025-05-08T00:41:07.355634368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:07.357404 env[1200]: time="2025-05-08T00:41:07.357330395Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:07.357791 env[1200]: time="2025-05-08T00:41:07.357745540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 8 00:41:07.360255 env[1200]: time="2025-05-08T00:41:07.360208916Z" level=info msg="CreateContainer within sandbox \"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:41:07.376324 env[1200]: time="2025-05-08T00:41:07.376241461Z" level=info msg="CreateContainer within sandbox \"67c3b253ed068ecbe2aaddceedb09432155583199e2daf8223513761c78ba6d4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"562a830a2d5606ca961bacf56b3fd3867e7f4cb0009b834efd36158dfcd3188c\"" May 8 00:41:07.377104 env[1200]: time="2025-05-08T00:41:07.377053796Z" level=info msg="StartContainer for \"562a830a2d5606ca961bacf56b3fd3867e7f4cb0009b834efd36158dfcd3188c\"" May 8 00:41:07.404817 systemd[1]: Started cri-containerd-562a830a2d5606ca961bacf56b3fd3867e7f4cb0009b834efd36158dfcd3188c.scope. May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8d1a1bb858 items=0 ppid=3733 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326138333061326435363036636139363162616366353662336664 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit: BPF prog-id=205 op=LOAD May 8 00:41:07.421000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003521d8 items=0 ppid=3733 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326138333061326435363036636139363162616366353662336664 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.421000 audit: BPF prog-id=206 op=LOAD May 8 00:41:07.421000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000352228 items=0 ppid=3733 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326138333061326435363036636139363162616366353662336664 May 8 00:41:07.422000 audit: BPF prog-id=206 op=UNLOAD May 8 00:41:07.422000 audit: BPF prog-id=205 op=UNLOAD May 8 00:41:07.422000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:07.422000 audit: BPF prog-id=207 op=LOAD May 8 00:41:07.422000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003522b8 items=0 ppid=3733 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:07.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326138333061326435363036636139363162616366353662336664 May 8 00:41:07.530401 env[1200]: time="2025-05-08T00:41:07.530324661Z" level=info msg="StartContainer for \"562a830a2d5606ca961bacf56b3fd3867e7f4cb0009b834efd36158dfcd3188c\" returns successfully" May 8 00:41:08.057777 kubelet[1956]: I0508 00:41:08.057723 1956 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:41:08.057777 kubelet[1956]: I0508 00:41:08.057778 1956 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:41:08.383852 kubelet[1956]: I0508 00:41:08.383664 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-lxwb2" podStartSLOduration=47.388335588 podStartE2EDuration="1m3.383643338s" podCreationTimestamp="2025-05-08 00:40:05 +0000 UTC" firstStartedPulling="2025-05-08 00:40:51.363739893 +0000 UTC m=+59.613580698" lastFinishedPulling="2025-05-08 00:41:07.359047633 +0000 UTC m=+75.608888448" observedRunningTime="2025-05-08 00:41:08.383294181 +0000 UTC m=+76.633134996" watchObservedRunningTime="2025-05-08 00:41:08.383643338 +0000 UTC m=+76.633484163" May 8 00:41:08.716420 systemd[1]: Started sshd@15-10.0.0.23:22-10.0.0.1:50258.service. May 8 00:41:08.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:50258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:08.718588 kernel: kauditd_printk_skb: 189 callbacks suppressed May 8 00:41:08.718657 kernel: audit: type=1130 audit(1746664868.715:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:50258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:08.759000 audit[4712]: USER_ACCT pid=4712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.766338 kernel: audit: type=1101 audit(1746664868.759:1426): pid=4712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.766383 sshd[4712]: Accepted publickey for core from 10.0.0.1 port 50258 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:08.765000 audit[4712]: CRED_ACQ pid=4712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.767003 sshd[4712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:08.775359 kernel: audit: type=1103 audit(1746664868.765:1427): pid=4712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.775455 kernel: audit: type=1006 audit(1746664868.765:1428): pid=4712 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 8 00:41:08.765000 audit[4712]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1eeaa030 a2=3 a3=0 items=0 ppid=1 pid=4712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:08.775842 systemd[1]: Started session-16.scope. May 8 00:41:08.777153 systemd-logind[1189]: New session 16 of user core. May 8 00:41:08.781101 kernel: audit: type=1300 audit(1746664868.765:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1eeaa030 a2=3 a3=0 items=0 ppid=1 pid=4712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:08.781161 kernel: audit: type=1327 audit(1746664868.765:1428): proctitle=737368643A20636F7265205B707269765D May 8 00:41:08.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:08.780000 audit[4712]: USER_START pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.787738 kernel: audit: type=1105 audit(1746664868.780:1429): pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.787802 kernel: audit: type=1103 audit(1746664868.782:1430): pid=4714 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.782000 audit[4714]: CRED_ACQ pid=4714 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.941804 sshd[4712]: pam_unix(sshd:session): session closed for user core May 8 00:41:08.941000 audit[4712]: USER_END pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.945000 systemd[1]: sshd@15-10.0.0.23:22-10.0.0.1:50258.service: Deactivated successfully. May 8 00:41:08.945908 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:41:08.946507 systemd-logind[1189]: Session 16 logged out. Waiting for processes to exit. May 8 00:41:08.947397 systemd-logind[1189]: Removed session 16. May 8 00:41:08.942000 audit[4712]: CRED_DISP pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.952276 kernel: audit: type=1106 audit(1746664868.941:1431): pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.952340 kernel: audit: type=1104 audit(1746664868.942:1432): pid=4712 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:08.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:50258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:12.850829 kubelet[1956]: E0508 00:41:12.850777 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:12.850829 kubelet[1956]: E0508 00:41:12.850777 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:13.947583 systemd[1]: Started sshd@16-10.0.0.23:22-10.0.0.1:50268.service. May 8 00:41:13.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:13.948827 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:41:13.948886 kernel: audit: type=1130 audit(1746664873.946:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:13.986000 audit[4729]: USER_ACCT pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:13.989260 sshd[4729]: Accepted publickey for core from 10.0.0.1 port 50268 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:13.990000 audit[4729]: CRED_ACQ pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:13.992348 sshd[4729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:13.995502 kernel: audit: type=1101 audit(1746664873.986:1435): pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:13.995655 kernel: audit: type=1103 audit(1746664873.990:1436): pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:13.995986 kernel: audit: type=1006 audit(1746664873.990:1437): pid=4729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 8 00:41:13.996826 systemd-logind[1189]: New session 17 of user core. May 8 00:41:13.997778 systemd[1]: Started session-17.scope. May 8 00:41:13.990000 audit[4729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc397a2150 a2=3 a3=0 items=0 ppid=1 pid=4729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.002685 kernel: audit: type=1300 audit(1746664873.990:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc397a2150 a2=3 a3=0 items=0 ppid=1 pid=4729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.002755 kernel: audit: type=1327 audit(1746664873.990:1437): proctitle=737368643A20636F7265205B707269765D May 8 00:41:13.990000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:14.001000 audit[4729]: USER_START pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.008421 kernel: audit: type=1105 audit(1746664874.001:1438): pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.008479 kernel: audit: type=1103 audit(1746664874.003:1439): pid=4731 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.003000 audit[4731]: CRED_ACQ pid=4731 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.121481 sshd[4729]: pam_unix(sshd:session): session closed for user core May 8 00:41:14.121000 audit[4729]: USER_END pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.124983 systemd[1]: sshd@16-10.0.0.23:22-10.0.0.1:50268.service: Deactivated successfully. May 8 00:41:14.125904 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:41:14.127541 systemd-logind[1189]: Session 17 logged out. Waiting for processes to exit. May 8 00:41:14.121000 audit[4729]: CRED_DISP pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.129661 systemd-logind[1189]: Removed session 17. May 8 00:41:14.131659 kernel: audit: type=1106 audit(1746664874.121:1440): pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.131786 kernel: audit: type=1104 audit(1746664874.121:1441): pid=4729 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:14.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:15.850298 kubelet[1956]: E0508 00:41:15.850249 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:17.752178 kubelet[1956]: I0508 00:41:17.752130 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:41:18.153000 audit[4766]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.153000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc279644d0 a2=0 a3=7ffc279644bc items=0 ppid=2148 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:18.158000 audit[4766]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.158000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc279644d0 a2=0 a3=7ffc279644bc items=0 ppid=2148 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:19.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:19.127451 systemd[1]: Started sshd@17-10.0.0.23:22-10.0.0.1:34778.service. May 8 00:41:19.128738 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:41:19.128792 kernel: audit: type=1130 audit(1746664879.126:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:19.169000 audit[4768]: USER_ACCT pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.170627 sshd[4768]: Accepted publickey for core from 10.0.0.1 port 34778 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:19.175068 kernel: audit: type=1101 audit(1746664879.169:1446): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.175161 kernel: audit: type=1103 audit(1746664879.173:1447): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.173000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.175694 sshd[4768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:19.187740 kernel: audit: type=1006 audit(1746664879.174:1448): pid=4768 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 8 00:41:19.187965 kernel: audit: type=1300 audit(1746664879.174:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe857ed20 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.188003 kernel: audit: type=1327 audit(1746664879.174:1448): proctitle=737368643A20636F7265205B707269765D May 8 00:41:19.174000 audit[4768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe857ed20 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:19.180670 systemd-logind[1189]: New session 18 of user core. May 8 00:41:19.181369 systemd[1]: Started session-18.scope. May 8 00:41:19.188000 audit[4768]: USER_START pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.195051 kernel: audit: type=1105 audit(1746664879.188:1449): pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.190000 audit[4770]: CRED_ACQ pid=4770 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.199102 kernel: audit: type=1103 audit(1746664879.190:1450): pid=4770 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.313379 sshd[4768]: pam_unix(sshd:session): session closed for user core May 8 00:41:19.313000 audit[4768]: USER_END pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.315959 systemd[1]: sshd@17-10.0.0.23:22-10.0.0.1:34778.service: Deactivated successfully. May 8 00:41:19.316809 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:41:19.317466 systemd-logind[1189]: Session 18 logged out. Waiting for processes to exit. May 8 00:41:19.318425 systemd-logind[1189]: Removed session 18. May 8 00:41:19.313000 audit[4768]: CRED_DISP pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.362177 kernel: audit: type=1106 audit(1746664879.313:1451): pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.362335 kernel: audit: type=1104 audit(1746664879.313:1452): pid=4768 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:19.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:24.318696 systemd[1]: Started sshd@18-10.0.0.23:22-10.0.0.1:34780.service. May 8 00:41:24.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:34780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:24.323562 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:41:24.323652 kernel: audit: type=1130 audit(1746664884.317:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:34780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:24.361000 audit[4783]: USER_ACCT pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.362666 sshd[4783]: Accepted publickey for core from 10.0.0.1 port 34780 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:24.367634 sshd[4783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:24.366000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.371739 systemd-logind[1189]: New session 19 of user core. May 8 00:41:24.372360 kernel: audit: type=1101 audit(1746664884.361:1455): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.372416 kernel: audit: type=1103 audit(1746664884.366:1456): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.372557 systemd[1]: Started session-19.scope. May 8 00:41:24.375152 kernel: audit: type=1006 audit(1746664884.366:1457): pid=4783 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 8 00:41:24.375225 kernel: audit: type=1300 audit(1746664884.366:1457): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe03c2820 a2=3 a3=0 items=0 ppid=1 pid=4783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:24.366000 audit[4783]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe03c2820 a2=3 a3=0 items=0 ppid=1 pid=4783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:24.379582 kernel: audit: type=1327 audit(1746664884.366:1457): proctitle=737368643A20636F7265205B707269765D May 8 00:41:24.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:24.376000 audit[4783]: USER_START pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.385845 kernel: audit: type=1105 audit(1746664884.376:1458): pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.385901 kernel: audit: type=1103 audit(1746664884.377:1459): pid=4785 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.377000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.545961 sshd[4783]: pam_unix(sshd:session): session closed for user core May 8 00:41:24.545000 audit[4783]: USER_END pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.548205 systemd[1]: sshd@18-10.0.0.23:22-10.0.0.1:34780.service: Deactivated successfully. May 8 00:41:24.549056 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:41:24.546000 audit[4783]: CRED_DISP pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.554850 systemd-logind[1189]: Session 19 logged out. Waiting for processes to exit. May 8 00:41:24.556006 systemd-logind[1189]: Removed session 19. May 8 00:41:24.556674 kernel: audit: type=1106 audit(1746664884.545:1460): pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.556758 kernel: audit: type=1104 audit(1746664884.546:1461): pid=4783 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:24.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:34780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:29.551400 systemd[1]: Started sshd@19-10.0.0.23:22-10.0.0.1:52138.service. May 8 00:41:29.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.23:22-10.0.0.1:52138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:29.554480 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:41:29.554557 kernel: audit: type=1130 audit(1746664889.550:1463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.23:22-10.0.0.1:52138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:29.889000 audit[4806]: USER_ACCT pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.891208 sshd[4806]: Accepted publickey for core from 10.0.0.1 port 52138 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:29.893459 sshd[4806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:29.898440 systemd[1]: Started session-20.scope. May 8 00:41:29.899197 systemd-logind[1189]: New session 20 of user core. May 8 00:41:29.892000 audit[4806]: CRED_ACQ pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.928069 kernel: audit: type=1101 audit(1746664889.889:1464): pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.928200 kernel: audit: type=1103 audit(1746664889.892:1465): pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.928230 kernel: audit: type=1006 audit(1746664889.892:1466): pid=4806 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 8 00:41:29.930834 kernel: audit: type=1300 audit(1746664889.892:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfd51c90 a2=3 a3=0 items=0 ppid=1 pid=4806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:29.892000 audit[4806]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfd51c90 a2=3 a3=0 items=0 ppid=1 pid=4806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:29.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:29.936956 kernel: audit: type=1327 audit(1746664889.892:1466): proctitle=737368643A20636F7265205B707269765D May 8 00:41:29.937156 kernel: audit: type=1105 audit(1746664889.903:1467): pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.943133 kernel: audit: type=1103 audit(1746664889.904:1468): pid=4808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.903000 audit[4806]: USER_START pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:29.904000 audit[4808]: CRED_ACQ pid=4808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.034154 sshd[4806]: pam_unix(sshd:session): session closed for user core May 8 00:41:30.034000 audit[4806]: USER_END pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.037272 systemd[1]: sshd@19-10.0.0.23:22-10.0.0.1:52138.service: Deactivated successfully. May 8 00:41:30.037834 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:41:30.038385 systemd-logind[1189]: Session 20 logged out. Waiting for processes to exit. May 8 00:41:30.039731 systemd[1]: Started sshd@20-10.0.0.23:22-10.0.0.1:52150.service. May 8 00:41:30.040885 systemd-logind[1189]: Removed session 20. May 8 00:41:30.050044 kernel: audit: type=1106 audit(1746664890.034:1469): pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.050117 kernel: audit: type=1104 audit(1746664890.034:1470): pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.034000 audit[4806]: CRED_DISP pid=4806 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.23:22-10.0.0.1:52138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:30.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.23:22-10.0.0.1:52150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:30.082000 audit[4819]: USER_ACCT pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.083444 sshd[4819]: Accepted publickey for core from 10.0.0.1 port 52150 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:30.082000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.083000 audit[4819]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18be7600 a2=3 a3=0 items=0 ppid=1 pid=4819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:30.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:30.084346 sshd[4819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:30.087829 systemd-logind[1189]: New session 21 of user core. May 8 00:41:30.088677 systemd[1]: Started session-21.scope. May 8 00:41:30.092000 audit[4819]: USER_START pid=4819 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.094000 audit[4821]: CRED_ACQ pid=4821 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.828821 sshd[4819]: pam_unix(sshd:session): session closed for user core May 8 00:41:30.829000 audit[4819]: USER_END pid=4819 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.829000 audit[4819]: CRED_DISP pid=4819 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.832662 systemd[1]: Started sshd@21-10.0.0.23:22-10.0.0.1:52166.service. May 8 00:41:30.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.23:22-10.0.0.1:52166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:30.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.23:22-10.0.0.1:52150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:30.833273 systemd[1]: sshd@20-10.0.0.23:22-10.0.0.1:52150.service: Deactivated successfully. May 8 00:41:30.834001 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:41:30.834651 systemd-logind[1189]: Session 21 logged out. Waiting for processes to exit. May 8 00:41:30.835422 systemd-logind[1189]: Removed session 21. May 8 00:41:30.877000 audit[4829]: USER_ACCT pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.878828 sshd[4829]: Accepted publickey for core from 10.0.0.1 port 52166 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:30.879000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.879000 audit[4829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee4fc4530 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:30.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:30.880574 sshd[4829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:30.884511 systemd-logind[1189]: New session 22 of user core. May 8 00:41:30.885611 systemd[1]: Started session-22.scope. May 8 00:41:30.889000 audit[4829]: USER_START pid=4829 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:30.891000 audit[4832]: CRED_ACQ pid=4832 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:31.235245 kubelet[1956]: I0508 00:41:31.235104 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:41:31.294000 audit[4841]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:31.294000 audit[4841]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9bfafbd0 a2=0 a3=7ffd9bfafbbc items=0 ppid=2148 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:31.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:31.301000 audit[4841]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:31.301000 audit[4841]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd9bfafbd0 a2=0 a3=7ffd9bfafbbc items=0 ppid=2148 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:31.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.038000 audit[4862]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.038000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd3699ab50 a2=0 a3=7ffd3699ab3c items=0 ppid=2148 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.048000 audit[4862]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.048000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd3699ab50 a2=0 a3=0 items=0 ppid=2148 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.337826 sshd[4829]: pam_unix(sshd:session): session closed for user core May 8 00:41:32.338000 audit[4829]: USER_END pid=4829 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.338000 audit[4829]: CRED_DISP pid=4829 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.341305 systemd[1]: sshd@21-10.0.0.23:22-10.0.0.1:52166.service: Deactivated successfully. May 8 00:41:32.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.23:22-10.0.0.1:52166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:32.342055 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:41:32.342686 systemd-logind[1189]: Session 22 logged out. Waiting for processes to exit. May 8 00:41:32.344403 systemd[1]: Started sshd@22-10.0.0.23:22-10.0.0.1:52172.service. May 8 00:41:32.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.23:22-10.0.0.1:52172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:32.346197 systemd-logind[1189]: Removed session 22. May 8 00:41:32.385000 audit[4865]: USER_ACCT pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.386368 sshd[4865]: Accepted publickey for core from 10.0.0.1 port 52172 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:32.386000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.386000 audit[4865]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ffbfae0 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.386000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:32.387702 sshd[4865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:32.397388 systemd[1]: Started session-23.scope. May 8 00:41:32.398016 systemd-logind[1189]: New session 23 of user core. May 8 00:41:32.403000 audit[4865]: USER_START pid=4865 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.405000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.795603 sshd[4865]: pam_unix(sshd:session): session closed for user core May 8 00:41:32.795000 audit[4865]: USER_END pid=4865 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.795000 audit[4865]: CRED_DISP pid=4865 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.799185 systemd[1]: sshd@22-10.0.0.23:22-10.0.0.1:52172.service: Deactivated successfully. May 8 00:41:32.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.23:22-10.0.0.1:52172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:32.799913 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:41:32.800685 systemd-logind[1189]: Session 23 logged out. Waiting for processes to exit. May 8 00:41:32.801861 systemd[1]: Started sshd@23-10.0.0.23:22-10.0.0.1:52186.service. May 8 00:41:32.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.23:22-10.0.0.1:52186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:32.804009 systemd-logind[1189]: Removed session 23. May 8 00:41:32.841000 audit[4877]: USER_ACCT pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.842908 sshd[4877]: Accepted publickey for core from 10.0.0.1 port 52186 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:32.842000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.843000 audit[4877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4fea4ef0 a2=3 a3=0 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:32.844387 sshd[4877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:32.848423 systemd-logind[1189]: New session 24 of user core. May 8 00:41:32.849440 systemd[1]: Started session-24.scope. May 8 00:41:32.853000 audit[4877]: USER_START pid=4877 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.855000 audit[4879]: CRED_ACQ pid=4879 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.972487 sshd[4877]: pam_unix(sshd:session): session closed for user core May 8 00:41:32.972000 audit[4877]: USER_END pid=4877 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.972000 audit[4877]: CRED_DISP pid=4877 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:32.975344 systemd[1]: sshd@23-10.0.0.23:22-10.0.0.1:52186.service: Deactivated successfully. May 8 00:41:32.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.23:22-10.0.0.1:52186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:32.976270 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:41:32.977128 systemd-logind[1189]: Session 24 logged out. Waiting for processes to exit. May 8 00:41:32.977938 systemd-logind[1189]: Removed session 24. May 8 00:41:33.071000 audit[4890]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:33.071000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff58b429b0 a2=0 a3=7fff58b4299c items=0 ppid=2148 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:33.078000 audit[4890]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:33.078000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff58b429b0 a2=0 a3=0 items=0 ppid=2148 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:35.334542 systemd[1]: run-containerd-runc-k8s.io-d5459af26a3234dec9d1207c468e0b46d7fa64458592ed0052f8690e9c1610fb-runc.fPRTC3.mount: Deactivated successfully. May 8 00:41:35.853697 kubelet[1956]: E0508 00:41:35.853625 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:37.976383 systemd[1]: Started sshd@24-10.0.0.23:22-10.0.0.1:52504.service. May 8 00:41:37.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:52504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:38.040914 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:41:38.041097 kernel: audit: type=1130 audit(1746664897.975:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:52504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:38.079000 audit[4914]: USER_ACCT pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.080438 sshd[4914]: Accepted publickey for core from 10.0.0.1 port 52504 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:38.082690 sshd[4914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:38.081000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.162851 kernel: audit: type=1101 audit(1746664898.079:1515): pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.162933 kernel: audit: type=1103 audit(1746664898.081:1516): pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.162961 kernel: audit: type=1006 audit(1746664898.081:1517): pid=4914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 8 00:41:38.157304 systemd[1]: Started session-25.scope. May 8 00:41:38.157447 systemd-logind[1189]: New session 25 of user core. May 8 00:41:38.081000 audit[4914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0f03dc50 a2=3 a3=0 items=0 ppid=1 pid=4914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:38.170170 kernel: audit: type=1300 audit(1746664898.081:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0f03dc50 a2=3 a3=0 items=0 ppid=1 pid=4914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:38.170230 kernel: audit: type=1327 audit(1746664898.081:1517): proctitle=737368643A20636F7265205B707269765D May 8 00:41:38.081000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:38.161000 audit[4914]: USER_START pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.176517 kernel: audit: type=1105 audit(1746664898.161:1518): pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.176565 kernel: audit: type=1103 audit(1746664898.163:1519): pid=4916 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.163000 audit[4916]: CRED_ACQ pid=4916 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.284609 sshd[4914]: pam_unix(sshd:session): session closed for user core May 8 00:41:38.284000 audit[4914]: USER_END pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.287190 systemd[1]: sshd@24-10.0.0.23:22-10.0.0.1:52504.service: Deactivated successfully. May 8 00:41:38.287931 systemd[1]: session-25.scope: Deactivated successfully. May 8 00:41:38.288735 systemd-logind[1189]: Session 25 logged out. Waiting for processes to exit. May 8 00:41:38.289523 systemd-logind[1189]: Removed session 25. May 8 00:41:38.284000 audit[4914]: CRED_DISP pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.296360 kernel: audit: type=1106 audit(1746664898.284:1520): pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.296456 kernel: audit: type=1104 audit(1746664898.284:1521): pid=4914 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:38.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:52504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:41.513000 audit[4927]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:41.513000 audit[4927]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc3c25ee90 a2=0 a3=7ffc3c25ee7c items=0 ppid=2148 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:41.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:41.518000 audit[4927]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=4927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:41.518000 audit[4927]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc3c25ee90 a2=0 a3=7ffc3c25ee7c items=0 ppid=2148 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:41.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:43.289556 systemd[1]: Started sshd@25-10.0.0.23:22-10.0.0.1:52510.service. May 8 00:41:43.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:52510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:43.314910 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:41:43.315085 kernel: audit: type=1130 audit(1746664903.288:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:52510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:43.349000 audit[4929]: USER_ACCT pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.350567 sshd[4929]: Accepted publickey for core from 10.0.0.1 port 52510 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:43.378081 kernel: audit: type=1101 audit(1746664903.349:1526): pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.377000 audit[4929]: CRED_ACQ pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.378525 sshd[4929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:43.382236 systemd-logind[1189]: New session 26 of user core. May 8 00:41:43.383170 systemd[1]: Started session-26.scope. May 8 00:41:43.384166 kernel: audit: type=1103 audit(1746664903.377:1527): pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.384235 kernel: audit: type=1006 audit(1746664903.377:1528): pid=4929 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 8 00:41:43.384255 kernel: audit: type=1300 audit(1746664903.377:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6999bbf0 a2=3 a3=0 items=0 ppid=1 pid=4929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:43.377000 audit[4929]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6999bbf0 a2=3 a3=0 items=0 ppid=1 pid=4929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:43.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:43.392093 kernel: audit: type=1327 audit(1746664903.377:1528): proctitle=737368643A20636F7265205B707269765D May 8 00:41:43.392185 kernel: audit: type=1105 audit(1746664903.387:1529): pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.387000 audit[4929]: USER_START pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.396890 kernel: audit: type=1103 audit(1746664903.389:1530): pid=4931 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.389000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.506422 sshd[4929]: pam_unix(sshd:session): session closed for user core May 8 00:41:43.506000 audit[4929]: USER_END pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.508947 systemd[1]: sshd@25-10.0.0.23:22-10.0.0.1:52510.service: Deactivated successfully. May 8 00:41:43.509887 systemd[1]: session-26.scope: Deactivated successfully. May 8 00:41:43.510455 systemd-logind[1189]: Session 26 logged out. Waiting for processes to exit. May 8 00:41:43.511121 systemd-logind[1189]: Removed session 26. May 8 00:41:43.506000 audit[4929]: CRED_DISP pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.517006 kernel: audit: type=1106 audit(1746664903.506:1531): pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.517095 kernel: audit: type=1104 audit(1746664903.506:1532): pid=4929 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:43.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:52510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:47.211498 kubelet[1956]: E0508 00:41:47.211454 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:47.701000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:47.701000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:47.701000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001563d80 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:47.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:47.701000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024682a0 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:47.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:48.141000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.141000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.141000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00ddea500 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.141000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.141000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.141000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00fccf3b0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.141000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00dfca5c0 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.141000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00d9f5770 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.205000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.205000 audit[1806]: AVC avc: denied { watch } for pid=1806 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:48.205000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00d3ca660 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.205000 audit[1806]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00d9f5920 a2=fc6 a3=0 items=0 ppid=1663 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c403 key=(null) May 8 00:41:48.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:41:48.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:41910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:48.511663 systemd[1]: Started sshd@26-10.0.0.23:22-10.0.0.1:41910.service. May 8 00:41:48.512920 kernel: kauditd_printk_skb: 25 callbacks suppressed May 8 00:41:48.512959 kernel: audit: type=1130 audit(1746664908.510:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:41910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:48.554000 audit[4964]: USER_ACCT pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.555526 sshd[4964]: Accepted publickey for core from 10.0.0.1 port 41910 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:48.556809 sshd[4964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:48.555000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.555000 audit[4964]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e328380 a2=3 a3=0 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:48.572882 systemd-logind[1189]: New session 27 of user core. May 8 00:41:48.573133 systemd[1]: Started session-27.scope. May 8 00:41:48.576831 kernel: audit: type=1101 audit(1746664908.554:1543): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.576886 kernel: audit: type=1103 audit(1746664908.555:1544): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.577602 kernel: audit: type=1006 audit(1746664908.555:1545): pid=4964 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 8 00:41:48.577683 kernel: audit: type=1300 audit(1746664908.555:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e328380 a2=3 a3=0 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:48.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:48.584683 kernel: audit: type=1327 audit(1746664908.555:1545): proctitle=737368643A20636F7265205B707269765D May 8 00:41:48.584750 kernel: audit: type=1105 audit(1746664908.577:1546): pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.577000 audit[4964]: USER_START pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.579000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.592709 kernel: audit: type=1103 audit(1746664908.579:1547): pid=4966 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.718036 sshd[4964]: pam_unix(sshd:session): session closed for user core May 8 00:41:48.718000 audit[4964]: USER_END pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.720368 systemd[1]: sshd@26-10.0.0.23:22-10.0.0.1:41910.service: Deactivated successfully. May 8 00:41:48.721111 systemd[1]: session-27.scope: Deactivated successfully. May 8 00:41:48.721651 systemd-logind[1189]: Session 27 logged out. Waiting for processes to exit. May 8 00:41:48.722552 systemd-logind[1189]: Removed session 27. May 8 00:41:48.718000 audit[4964]: CRED_DISP pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.728353 kernel: audit: type=1106 audit(1746664908.718:1548): pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.728421 kernel: audit: type=1104 audit(1746664908.718:1549): pid=4964 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:48.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:41910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:51.517000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:51.517000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:51.517000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001684000 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:51.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:51.517000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001d4440 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:51.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:51.517000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:51.517000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e10880 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:51.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:51.519000 audit[1835]: AVC avc: denied { watch } for pid=1835 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:41:51.519000 audit[1835]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001d4480 a2=fc6 a3=0 items=0 ppid=1681 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c827 key=(null) May 8 00:41:51.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:41:53.448543 env[1200]: time="2025-05-08T00:41:53.448488538Z" level=info msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" May 8 00:41:53.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.23:22-10.0.0.1:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:53.723492 systemd[1]: Started sshd@27-10.0.0.23:22-10.0.0.1:41918.service. May 8 00:41:53.724663 kernel: kauditd_printk_skb: 13 callbacks suppressed May 8 00:41:53.724730 kernel: audit: type=1130 audit(1746664913.722:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.23:22-10.0.0.1:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:53.773000 audit[5011]: USER_ACCT pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.776963 sshd[5011]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:53.777898 sshd[5011]: Accepted publickey for core from 10.0.0.1 port 41918 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:53.775000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.783418 systemd[1]: Started session-28.scope. May 8 00:41:53.783799 systemd-logind[1189]: New session 28 of user core. May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.645 [WARNING][4995] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a54d3460-718f-4407-98c3-b431319cb589", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530", Pod:"coredns-668d6bf9bc-9z4wn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdfc5eaf901", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.646 [INFO][4995] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.646 [INFO][4995] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" iface="eth0" netns="" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.646 [INFO][4995] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.646 [INFO][4995] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.665 [INFO][5003] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.666 [INFO][5003] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.666 [INFO][5003] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.774 [WARNING][5003] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.774 [INFO][5003] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.777 [INFO][5003] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:53.784310 env[1200]: 2025-05-08 00:41:53.779 [INFO][4995] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:53.784310 env[1200]: time="2025-05-08T00:41:53.784131701Z" level=info msg="TearDown network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" successfully" May 8 00:41:53.784310 env[1200]: time="2025-05-08T00:41:53.784168651Z" level=info msg="StopPodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" returns successfully" May 8 00:41:53.787753 kernel: audit: type=1101 audit(1746664913.773:1556): pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.787800 kernel: audit: type=1103 audit(1746664913.775:1557): pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.787820 kernel: audit: type=1006 audit(1746664913.775:1558): pid=5011 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 8 00:41:53.787839 kernel: audit: type=1300 audit(1746664913.775:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe861c1af0 a2=3 a3=0 items=0 ppid=1 pid=5011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.775000 audit[5011]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe861c1af0 a2=3 a3=0 items=0 ppid=1 pid=5011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.788001 env[1200]: time="2025-05-08T00:41:53.784825201Z" level=info msg="RemovePodSandbox for \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" May 8 00:41:53.788001 env[1200]: time="2025-05-08T00:41:53.784860639Z" level=info msg="Forcibly stopping sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\"" May 8 00:41:53.795069 kernel: audit: type=1327 audit(1746664913.775:1558): proctitle=737368643A20636F7265205B707269765D May 8 00:41:53.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:53.789000 audit[5011]: USER_START pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.800510 kernel: audit: type=1105 audit(1746664913.789:1559): pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.800593 kernel: audit: type=1103 audit(1746664913.791:1560): pid=5018 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.791000 audit[5018]: CRED_ACQ pid=5018 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.982260 sshd[5011]: pam_unix(sshd:session): session closed for user core May 8 00:41:53.987000 audit[5011]: USER_END pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.990355 systemd[1]: sshd@27-10.0.0.23:22-10.0.0.1:41918.service: Deactivated successfully. May 8 00:41:53.991275 systemd[1]: session-28.scope: Deactivated successfully. May 8 00:41:53.992639 systemd-logind[1189]: Session 28 logged out. Waiting for processes to exit. May 8 00:41:53.987000 audit[5011]: CRED_DISP pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.993591 systemd-logind[1189]: Removed session 28. May 8 00:41:53.997426 kernel: audit: type=1106 audit(1746664913.987:1561): pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.997529 kernel: audit: type=1104 audit(1746664913.987:1562): pid=5011 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:53.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.23:22-10.0.0.1:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:53.961 [WARNING][5031] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a54d3460-718f-4407-98c3-b431319cb589", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b33b18235e6592bef04fe1135befabea7caa32fd1241a3ca145b05393f70530", Pod:"coredns-668d6bf9bc-9z4wn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdfc5eaf901", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:53.962 [INFO][5031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:53.962 [INFO][5031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" iface="eth0" netns="" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:53.962 [INFO][5031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:53.962 [INFO][5031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.004 [INFO][5048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.004 [INFO][5048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.005 [INFO][5048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.014 [WARNING][5048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.014 [INFO][5048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" HandleID="k8s-pod-network.0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" Workload="localhost-k8s-coredns--668d6bf9bc--9z4wn-eth0" May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.016 [INFO][5048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.019530 env[1200]: 2025-05-08 00:41:54.017 [INFO][5031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679" May 8 00:41:54.020118 env[1200]: time="2025-05-08T00:41:54.019553141Z" level=info msg="TearDown network for sandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" successfully" May 8 00:41:54.028928 env[1200]: time="2025-05-08T00:41:54.028886219Z" level=info msg="RemovePodSandbox \"0e766bb723148442480d425bbf652e62e2d2360f5d215ca9a68d7ee7c9e6b679\" returns successfully" May 8 00:41:54.029381 env[1200]: time="2025-05-08T00:41:54.029362670Z" level=info msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.063 [WARNING][5074] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0", GenerateName:"calico-kube-controllers-65bb755b6d-", Namespace:"calico-system", SelfLink:"", UID:"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65bb755b6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c", Pod:"calico-kube-controllers-65bb755b6d-bp9hs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4c6c52618cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.063 [INFO][5074] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.063 [INFO][5074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" iface="eth0" netns="" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.063 [INFO][5074] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.063 [INFO][5074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.083 [INFO][5082] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.084 [INFO][5082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.084 [INFO][5082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.091 [WARNING][5082] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.091 [INFO][5082] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.093 [INFO][5082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.096046 env[1200]: 2025-05-08 00:41:54.094 [INFO][5074] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.096674 env[1200]: time="2025-05-08T00:41:54.096089277Z" level=info msg="TearDown network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" successfully" May 8 00:41:54.096674 env[1200]: time="2025-05-08T00:41:54.096121828Z" level=info msg="StopPodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" returns successfully" May 8 00:41:54.096830 env[1200]: time="2025-05-08T00:41:54.096786495Z" level=info msg="RemovePodSandbox for \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" May 8 00:41:54.096870 env[1200]: time="2025-05-08T00:41:54.096831890Z" level=info msg="Forcibly stopping sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\"" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.131 [WARNING][5104] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0", GenerateName:"calico-kube-controllers-65bb755b6d-", Namespace:"calico-system", SelfLink:"", UID:"4c61ef1f-41e0-4e37-971a-16e5f90dc7ff", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65bb755b6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c7dbb1b9a14e320554fa180933cf69c0b65bfd64050e527d0caa1fb573bd1b9c", Pod:"calico-kube-controllers-65bb755b6d-bp9hs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4c6c52618cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.131 [INFO][5104] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.131 [INFO][5104] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" iface="eth0" netns="" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.131 [INFO][5104] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.132 [INFO][5104] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.157 [INFO][5113] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.157 [INFO][5113] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.157 [INFO][5113] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.163 [WARNING][5113] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.163 [INFO][5113] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" HandleID="k8s-pod-network.3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" Workload="localhost-k8s-calico--kube--controllers--65bb755b6d--bp9hs-eth0" May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.164 [INFO][5113] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.167703 env[1200]: 2025-05-08 00:41:54.165 [INFO][5104] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac" May 8 00:41:54.168362 env[1200]: time="2025-05-08T00:41:54.167740671Z" level=info msg="TearDown network for sandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" successfully" May 8 00:41:54.171145 env[1200]: time="2025-05-08T00:41:54.171107183Z" level=info msg="RemovePodSandbox \"3d3627e42c2dd1ef7f2347459d402bb4038228e64512f43478062d3d289e6eac\" returns successfully" May 8 00:41:54.171678 env[1200]: time="2025-05-08T00:41:54.171619792Z" level=info msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.207 [WARNING][5135] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"b03d252a-cc0d-4923-bef4-402eb924aa23", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c", Pod:"calico-apiserver-8648d74b4f-wxqtb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2caed97fd40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.207 [INFO][5135] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.207 [INFO][5135] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" iface="eth0" netns="" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.207 [INFO][5135] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.207 [INFO][5135] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.226 [INFO][5143] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.226 [INFO][5143] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.226 [INFO][5143] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.232 [WARNING][5143] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.232 [INFO][5143] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.233 [INFO][5143] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.237056 env[1200]: 2025-05-08 00:41:54.235 [INFO][5135] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.237056 env[1200]: time="2025-05-08T00:41:54.236987742Z" level=info msg="TearDown network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" successfully" May 8 00:41:54.237056 env[1200]: time="2025-05-08T00:41:54.237020303Z" level=info msg="StopPodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" returns successfully" May 8 00:41:54.237986 env[1200]: time="2025-05-08T00:41:54.237635225Z" level=info msg="RemovePodSandbox for \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" May 8 00:41:54.237986 env[1200]: time="2025-05-08T00:41:54.237679770Z" level=info msg="Forcibly stopping sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\"" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.278 [WARNING][5166] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0", GenerateName:"calico-apiserver-8648d74b4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"b03d252a-cc0d-4923-bef4-402eb924aa23", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8648d74b4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f76cc10e8d00e447f58c40ccda4c570e42b4d1f19e0a5d98aecf1335728ab7c", Pod:"calico-apiserver-8648d74b4f-wxqtb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2caed97fd40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.278 [INFO][5166] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.278 [INFO][5166] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" iface="eth0" netns="" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.278 [INFO][5166] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.278 [INFO][5166] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.301 [INFO][5175] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.302 [INFO][5175] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.302 [INFO][5175] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.308 [WARNING][5175] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.308 [INFO][5175] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" HandleID="k8s-pod-network.f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" Workload="localhost-k8s-calico--apiserver--8648d74b4f--wxqtb-eth0" May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.309 [INFO][5175] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.313065 env[1200]: 2025-05-08 00:41:54.311 [INFO][5166] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807" May 8 00:41:54.314255 env[1200]: time="2025-05-08T00:41:54.314174807Z" level=info msg="TearDown network for sandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" successfully" May 8 00:41:54.317745 env[1200]: time="2025-05-08T00:41:54.317699648Z" level=info msg="RemovePodSandbox \"f269ee42bd54bb7d09c9fa9f47068cce366774e99bc59110cfd62682266da807\" returns successfully" May 8 00:41:54.318351 env[1200]: time="2025-05-08T00:41:54.318307677Z" level=info msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.357 [WARNING][5199] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qww7p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b5352dd-133d-49d5-bee4-b3ab69bc975c", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a", Pod:"coredns-668d6bf9bc-qww7p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic363d4ace3c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.357 [INFO][5199] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.358 [INFO][5199] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" iface="eth0" netns="" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.358 [INFO][5199] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.358 [INFO][5199] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.379 [INFO][5207] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.379 [INFO][5207] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.379 [INFO][5207] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.384 [WARNING][5207] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.385 [INFO][5207] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.386 [INFO][5207] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.389741 env[1200]: 2025-05-08 00:41:54.387 [INFO][5199] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.390520 env[1200]: time="2025-05-08T00:41:54.389788879Z" level=info msg="TearDown network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" successfully" May 8 00:41:54.390520 env[1200]: time="2025-05-08T00:41:54.389823926Z" level=info msg="StopPodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" returns successfully" May 8 00:41:54.391327 env[1200]: time="2025-05-08T00:41:54.391290187Z" level=info msg="RemovePodSandbox for \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" May 8 00:41:54.391588 env[1200]: time="2025-05-08T00:41:54.391537634Z" level=info msg="Forcibly stopping sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\"" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.428 [WARNING][5231] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qww7p-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b5352dd-133d-49d5-bee4-b3ab69bc975c", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66e151874dea266f8b5a3867bc91b3e9521287ddf4603ed184c57d571ce8271a", Pod:"coredns-668d6bf9bc-qww7p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic363d4ace3c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.429 [INFO][5231] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.429 [INFO][5231] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" iface="eth0" netns="" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.429 [INFO][5231] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.429 [INFO][5231] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.447 [INFO][5239] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.447 [INFO][5239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.447 [INFO][5239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.454 [WARNING][5239] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.454 [INFO][5239] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" HandleID="k8s-pod-network.f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" Workload="localhost-k8s-coredns--668d6bf9bc--qww7p-eth0" May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.455 [INFO][5239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:54.458885 env[1200]: 2025-05-08 00:41:54.457 [INFO][5231] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a" May 8 00:41:54.459585 env[1200]: time="2025-05-08T00:41:54.458913298Z" level=info msg="TearDown network for sandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" successfully" May 8 00:41:54.462833 env[1200]: time="2025-05-08T00:41:54.462778092Z" level=info msg="RemovePodSandbox \"f25bcbaaff3946c5dfe985576870bf55241156fec7fafce3e1425ac814505b1a\" returns successfully" May 8 00:41:57.196000 audit[4444]: AVC avc: denied { watch } for pid=4444 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_40_34.841155388/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c381,c498 tclass=file permissive=0 May 8 00:41:57.196000 audit[4444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00121ab80 a2=fc6 a3=0 items=0 ppid=3678 pid=4444 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c381,c498 key=(null) May 8 00:41:57.196000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:41:58.984790 systemd[1]: Started sshd@28-10.0.0.23:22-10.0.0.1:33604.service. May 8 00:41:58.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.23:22-10.0.0.1:33604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:58.986061 kernel: kauditd_printk_skb: 4 callbacks suppressed May 8 00:41:58.986134 kernel: audit: type=1130 audit(1746664918.983:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.23:22-10.0.0.1:33604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:41:59.028000 audit[5248]: USER_ACCT pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.029550 sshd[5248]: Accepted publickey for core from 10.0.0.1 port 33604 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:41:59.031683 sshd[5248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:41:59.041499 kernel: audit: type=1101 audit(1746664919.028:1566): pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.041683 kernel: audit: type=1103 audit(1746664919.030:1567): pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.041723 kernel: audit: type=1006 audit(1746664919.030:1568): pid=5248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 8 00:41:59.030000 audit[5248]: CRED_ACQ pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.037497 systemd-logind[1189]: New session 29 of user core. May 8 00:41:59.038132 systemd[1]: Started session-29.scope. May 8 00:41:59.047934 kernel: audit: type=1300 audit(1746664919.030:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1c53950 a2=3 a3=0 items=0 ppid=1 pid=5248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:59.047997 kernel: audit: type=1327 audit(1746664919.030:1568): proctitle=737368643A20636F7265205B707269765D May 8 00:41:59.030000 audit[5248]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1c53950 a2=3 a3=0 items=0 ppid=1 pid=5248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:59.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:41:59.043000 audit[5248]: USER_START pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.044000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.056347 kernel: audit: type=1105 audit(1746664919.043:1569): pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.056459 kernel: audit: type=1103 audit(1746664919.044:1570): pid=5251 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.161327 sshd[5248]: pam_unix(sshd:session): session closed for user core May 8 00:41:59.161000 audit[5248]: USER_END pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.164210 systemd[1]: sshd@28-10.0.0.23:22-10.0.0.1:33604.service: Deactivated successfully. May 8 00:41:59.164937 systemd[1]: session-29.scope: Deactivated successfully. May 8 00:41:59.165634 systemd-logind[1189]: Session 29 logged out. Waiting for processes to exit. May 8 00:41:59.166404 systemd-logind[1189]: Removed session 29. May 8 00:41:59.161000 audit[5248]: CRED_DISP pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.176722 kernel: audit: type=1106 audit(1746664919.161:1571): pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.176829 kernel: audit: type=1104 audit(1746664919.161:1572): pid=5248 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:41:59.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.23:22-10.0.0.1:33604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'