May 8 00:52:37.765211 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 8 00:52:37.765230 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed May 7 23:24:31 -00 2025 May 8 00:52:37.765238 kernel: efi: EFI v2.70 by EDK II May 8 00:52:37.765244 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 8 00:52:37.765249 kernel: random: crng init done May 8 00:52:37.765254 kernel: ACPI: Early table checksum verification disabled May 8 00:52:37.765260 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 8 00:52:37.765267 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 8 00:52:37.765273 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765284 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765290 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765295 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765301 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765306 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765315 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765321 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765327 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:52:37.765332 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 8 00:52:37.765338 kernel: NUMA: Failed to initialise from firmware May 8 00:52:37.765344 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:37.765350 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] May 8 00:52:37.765356 kernel: Zone ranges: May 8 00:52:37.765361 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:37.765368 kernel: DMA32 empty May 8 00:52:37.765374 kernel: Normal empty May 8 00:52:37.765379 kernel: Movable zone start for each node May 8 00:52:37.765385 kernel: Early memory node ranges May 8 00:52:37.765391 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 8 00:52:37.765396 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 8 00:52:37.765402 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 8 00:52:37.765408 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 8 00:52:37.765414 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 8 00:52:37.765419 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 8 00:52:37.765425 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 8 00:52:37.765431 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:52:37.765437 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 8 00:52:37.765443 kernel: psci: probing for conduit method from ACPI. May 8 00:52:37.765449 kernel: psci: PSCIv1.1 detected in firmware. May 8 00:52:37.765455 kernel: psci: Using standard PSCI v0.2 function IDs May 8 00:52:37.765460 kernel: psci: Trusted OS migration not required May 8 00:52:37.765468 kernel: psci: SMC Calling Convention v1.1 May 8 00:52:37.765475 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 8 00:52:37.765482 kernel: ACPI: SRAT not present May 8 00:52:37.765488 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 8 00:52:37.765494 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 8 00:52:37.765501 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 8 00:52:37.765506 kernel: Detected PIPT I-cache on CPU0 May 8 00:52:37.765513 kernel: CPU features: detected: GIC system register CPU interface May 8 00:52:37.765519 kernel: CPU features: detected: Hardware dirty bit management May 8 00:52:37.765525 kernel: CPU features: detected: Spectre-v4 May 8 00:52:37.765531 kernel: CPU features: detected: Spectre-BHB May 8 00:52:37.765538 kernel: CPU features: kernel page table isolation forced ON by KASLR May 8 00:52:37.765544 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 8 00:52:37.765551 kernel: CPU features: detected: ARM erratum 1418040 May 8 00:52:37.765557 kernel: CPU features: detected: SSBS not fully self-synchronizing May 8 00:52:37.765563 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 8 00:52:37.765569 kernel: Policy zone: DMA May 8 00:52:37.765576 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:52:37.765582 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:52:37.765588 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:52:37.765594 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:52:37.765600 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:52:37.765608 kernel: Memory: 2457396K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114892K reserved, 0K cma-reserved) May 8 00:52:37.765614 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:52:37.765620 kernel: trace event string verifier disabled May 8 00:52:37.765626 kernel: rcu: Preemptible hierarchical RCU implementation. May 8 00:52:37.765633 kernel: rcu: RCU event tracing is enabled. May 8 00:52:37.765639 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:52:37.765645 kernel: Trampoline variant of Tasks RCU enabled. May 8 00:52:37.765651 kernel: Tracing variant of Tasks RCU enabled. May 8 00:52:37.765658 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:52:37.765664 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:52:37.765670 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 8 00:52:37.765677 kernel: GICv3: 256 SPIs implemented May 8 00:52:37.765683 kernel: GICv3: 0 Extended SPIs implemented May 8 00:52:37.765689 kernel: GICv3: Distributor has no Range Selector support May 8 00:52:37.765695 kernel: Root IRQ handler: gic_handle_irq May 8 00:52:37.765701 kernel: GICv3: 16 PPIs implemented May 8 00:52:37.765707 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 8 00:52:37.765713 kernel: ACPI: SRAT not present May 8 00:52:37.765719 kernel: ITS [mem 0x08080000-0x0809ffff] May 8 00:52:37.765725 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 8 00:52:37.765732 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 8 00:52:37.765738 kernel: GICv3: using LPI property table @0x00000000400d0000 May 8 00:52:37.765744 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 8 00:52:37.765751 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:37.765757 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 8 00:52:37.765763 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 8 00:52:37.765769 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 8 00:52:37.765776 kernel: arm-pv: using stolen time PV May 8 00:52:37.765782 kernel: Console: colour dummy device 80x25 May 8 00:52:37.765788 kernel: ACPI: Core revision 20210730 May 8 00:52:37.765795 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 8 00:52:37.765802 kernel: pid_max: default: 32768 minimum: 301 May 8 00:52:37.765808 kernel: LSM: Security Framework initializing May 8 00:52:37.765815 kernel: SELinux: Initializing. May 8 00:52:37.765821 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:37.765828 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:52:37.765850 kernel: rcu: Hierarchical SRCU implementation. May 8 00:52:37.765856 kernel: Platform MSI: ITS@0x8080000 domain created May 8 00:52:37.765863 kernel: PCI/MSI: ITS@0x8080000 domain created May 8 00:52:37.765869 kernel: Remapping and enabling EFI services. May 8 00:52:37.765875 kernel: smp: Bringing up secondary CPUs ... May 8 00:52:37.765881 kernel: Detected PIPT I-cache on CPU1 May 8 00:52:37.765889 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 8 00:52:37.765895 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 8 00:52:37.765902 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:37.765908 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 8 00:52:37.765914 kernel: Detected PIPT I-cache on CPU2 May 8 00:52:37.765921 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 8 00:52:37.765927 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 8 00:52:37.765934 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:37.765940 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 8 00:52:37.765946 kernel: Detected PIPT I-cache on CPU3 May 8 00:52:37.765954 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 8 00:52:37.765960 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 8 00:52:37.765966 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:52:37.765972 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 8 00:52:37.765983 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:52:37.765991 kernel: SMP: Total of 4 processors activated. May 8 00:52:37.765997 kernel: CPU features: detected: 32-bit EL0 Support May 8 00:52:37.766004 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 8 00:52:37.766010 kernel: CPU features: detected: Common not Private translations May 8 00:52:37.766017 kernel: CPU features: detected: CRC32 instructions May 8 00:52:37.766023 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 8 00:52:37.766030 kernel: CPU features: detected: LSE atomic instructions May 8 00:52:37.766038 kernel: CPU features: detected: Privileged Access Never May 8 00:52:37.766044 kernel: CPU features: detected: RAS Extension Support May 8 00:52:37.766051 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 8 00:52:37.766057 kernel: CPU: All CPU(s) started at EL1 May 8 00:52:37.766064 kernel: alternatives: patching kernel code May 8 00:52:37.766071 kernel: devtmpfs: initialized May 8 00:52:37.766078 kernel: KASLR enabled May 8 00:52:37.766085 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:52:37.766091 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:52:37.766098 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:52:37.766104 kernel: SMBIOS 3.0.0 present. May 8 00:52:37.766111 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 8 00:52:37.766118 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:52:37.766124 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 8 00:52:37.766132 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 8 00:52:37.766139 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 8 00:52:37.766145 kernel: audit: initializing netlink subsys (disabled) May 8 00:52:37.766152 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 May 8 00:52:37.766158 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:52:37.766165 kernel: cpuidle: using governor menu May 8 00:52:37.766171 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 8 00:52:37.766178 kernel: ASID allocator initialised with 32768 entries May 8 00:52:37.766185 kernel: ACPI: bus type PCI registered May 8 00:52:37.766193 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:52:37.766199 kernel: Serial: AMBA PL011 UART driver May 8 00:52:37.766206 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:52:37.766212 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 8 00:52:37.766219 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:52:37.766225 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 8 00:52:37.766232 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:52:37.766239 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 8 00:52:37.766245 kernel: ACPI: Added _OSI(Module Device) May 8 00:52:37.766253 kernel: ACPI: Added _OSI(Processor Device) May 8 00:52:37.766260 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:52:37.766266 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:52:37.766273 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:52:37.766284 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:52:37.766290 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:52:37.766297 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:52:37.766303 kernel: ACPI: Interpreter enabled May 8 00:52:37.766310 kernel: ACPI: Using GIC for interrupt routing May 8 00:52:37.766318 kernel: ACPI: MCFG table detected, 1 entries May 8 00:52:37.766325 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 8 00:52:37.766331 kernel: printk: console [ttyAMA0] enabled May 8 00:52:37.766338 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:52:37.766460 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:52:37.766525 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 8 00:52:37.766589 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 8 00:52:37.766651 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 8 00:52:37.766709 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 8 00:52:37.766717 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 8 00:52:37.766724 kernel: PCI host bridge to bus 0000:00 May 8 00:52:37.766790 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 8 00:52:37.766885 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 8 00:52:37.766942 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 8 00:52:37.766995 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:52:37.767071 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 8 00:52:37.767148 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:52:37.767219 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 8 00:52:37.767294 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 8 00:52:37.769881 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:52:37.769947 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:52:37.770013 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 8 00:52:37.770076 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 8 00:52:37.770134 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 8 00:52:37.770187 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 8 00:52:37.770240 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 8 00:52:37.770248 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 8 00:52:37.770255 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 8 00:52:37.770262 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 8 00:52:37.770270 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 8 00:52:37.770286 kernel: iommu: Default domain type: Translated May 8 00:52:37.770294 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 8 00:52:37.770301 kernel: vgaarb: loaded May 8 00:52:37.770308 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:52:37.770315 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:52:37.770322 kernel: PTP clock support registered May 8 00:52:37.770328 kernel: Registered efivars operations May 8 00:52:37.770335 kernel: clocksource: Switched to clocksource arch_sys_counter May 8 00:52:37.770343 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:52:37.770350 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:52:37.770357 kernel: pnp: PnP ACPI init May 8 00:52:37.770431 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 8 00:52:37.770441 kernel: pnp: PnP ACPI: found 1 devices May 8 00:52:37.770448 kernel: NET: Registered PF_INET protocol family May 8 00:52:37.770455 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:52:37.770462 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:52:37.770471 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:52:37.770482 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:52:37.770488 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:52:37.770495 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:52:37.770502 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:37.770508 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:52:37.770515 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:52:37.770522 kernel: PCI: CLS 0 bytes, default 64 May 8 00:52:37.770528 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 8 00:52:37.770536 kernel: kvm [1]: HYP mode not available May 8 00:52:37.770543 kernel: Initialise system trusted keyrings May 8 00:52:37.770550 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:52:37.770556 kernel: Key type asymmetric registered May 8 00:52:37.770563 kernel: Asymmetric key parser 'x509' registered May 8 00:52:37.770569 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:52:37.770576 kernel: io scheduler mq-deadline registered May 8 00:52:37.770582 kernel: io scheduler kyber registered May 8 00:52:37.770589 kernel: io scheduler bfq registered May 8 00:52:37.770597 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 8 00:52:37.770603 kernel: ACPI: button: Power Button [PWRB] May 8 00:52:37.770610 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 8 00:52:37.770674 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 8 00:52:37.770683 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:52:37.770689 kernel: thunder_xcv, ver 1.0 May 8 00:52:37.770696 kernel: thunder_bgx, ver 1.0 May 8 00:52:37.770703 kernel: nicpf, ver 1.0 May 8 00:52:37.770709 kernel: nicvf, ver 1.0 May 8 00:52:37.770777 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 8 00:52:37.770852 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-08T00:52:37 UTC (1746665557) May 8 00:52:37.770862 kernel: hid: raw HID events driver (C) Jiri Kosina May 8 00:52:37.770869 kernel: NET: Registered PF_INET6 protocol family May 8 00:52:37.770875 kernel: Segment Routing with IPv6 May 8 00:52:37.770882 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:52:37.770888 kernel: NET: Registered PF_PACKET protocol family May 8 00:52:37.770895 kernel: Key type dns_resolver registered May 8 00:52:37.770903 kernel: registered taskstats version 1 May 8 00:52:37.770909 kernel: Loading compiled-in X.509 certificates May 8 00:52:37.770921 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: 47302b466ab2df930dd804d2ee9c8ab44de4e2dc' May 8 00:52:37.770927 kernel: Key type .fscrypt registered May 8 00:52:37.770934 kernel: Key type fscrypt-provisioning registered May 8 00:52:37.770941 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:52:37.770948 kernel: ima: Allocated hash algorithm: sha1 May 8 00:52:37.770954 kernel: ima: No architecture policies found May 8 00:52:37.770961 kernel: clk: Disabling unused clocks May 8 00:52:37.770969 kernel: Freeing unused kernel memory: 36416K May 8 00:52:37.770975 kernel: Run /init as init process May 8 00:52:37.770982 kernel: with arguments: May 8 00:52:37.770988 kernel: /init May 8 00:52:37.770995 kernel: with environment: May 8 00:52:37.771001 kernel: HOME=/ May 8 00:52:37.771007 kernel: TERM=linux May 8 00:52:37.771014 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:52:37.771022 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:37.771033 systemd[1]: Detected virtualization kvm. May 8 00:52:37.771040 systemd[1]: Detected architecture arm64. May 8 00:52:37.771047 systemd[1]: Running in initrd. May 8 00:52:37.771054 systemd[1]: No hostname configured, using default hostname. May 8 00:52:37.771060 systemd[1]: Hostname set to . May 8 00:52:37.771068 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:37.771075 systemd[1]: Queued start job for default target initrd.target. May 8 00:52:37.771084 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:37.771091 systemd[1]: Reached target cryptsetup.target. May 8 00:52:37.771098 systemd[1]: Reached target paths.target. May 8 00:52:37.771105 systemd[1]: Reached target slices.target. May 8 00:52:37.771112 systemd[1]: Reached target swap.target. May 8 00:52:37.771119 systemd[1]: Reached target timers.target. May 8 00:52:37.771129 systemd[1]: Listening on iscsid.socket. May 8 00:52:37.771139 systemd[1]: Listening on iscsiuio.socket. May 8 00:52:37.771147 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:52:37.771156 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:52:37.771163 systemd[1]: Listening on systemd-journald.socket. May 8 00:52:37.771171 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:37.771178 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:37.771187 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:37.771195 systemd[1]: Reached target sockets.target. May 8 00:52:37.771202 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:37.771210 systemd[1]: Finished network-cleanup.service. May 8 00:52:37.771219 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:52:37.771226 systemd[1]: Starting systemd-journald.service... May 8 00:52:37.771234 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:37.771241 systemd[1]: Starting systemd-resolved.service... May 8 00:52:37.771250 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:52:37.771257 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:37.771264 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:52:37.771272 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:52:37.771287 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:52:37.771295 kernel: audit: type=1130 audit(1746665557.767:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.771302 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:52:37.771314 systemd-journald[290]: Journal started May 8 00:52:37.771361 systemd-journald[290]: Runtime Journal (/run/log/journal/e05ac0f867114bb78f7d0c0fc09c1e17) is 6.0M, max 48.7M, 42.6M free. May 8 00:52:37.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.761150 systemd-modules-load[291]: Inserted module 'overlay' May 8 00:52:37.772966 systemd[1]: Started systemd-journald.service. May 8 00:52:37.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.776056 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:52:37.780330 kernel: audit: type=1130 audit(1746665557.772:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.780349 kernel: audit: type=1130 audit(1746665557.777:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.780878 systemd-resolved[292]: Positive Trust Anchors: May 8 00:52:37.780891 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:37.780919 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:37.786139 systemd-resolved[292]: Defaulting to hostname 'linux'. May 8 00:52:37.794265 kernel: audit: type=1130 audit(1746665557.788:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.794291 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:52:37.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.787947 systemd[1]: Started systemd-resolved.service. May 8 00:52:37.788952 systemd[1]: Reached target nss-lookup.target. May 8 00:52:37.796453 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:52:37.802842 kernel: audit: type=1130 audit(1746665557.797:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.802861 kernel: Bridge firewalling registered May 8 00:52:37.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.800295 systemd[1]: Starting dracut-cmdline.service... May 8 00:52:37.800725 systemd-modules-load[291]: Inserted module 'br_netfilter' May 8 00:52:37.809154 dracut-cmdline[307]: dracut-dracut-053 May 8 00:52:37.811330 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:52:37.815868 kernel: SCSI subsystem initialized May 8 00:52:37.820547 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:52:37.820593 kernel: device-mapper: uevent: version 1.0.3 May 8 00:52:37.820603 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:52:37.823272 systemd-modules-load[291]: Inserted module 'dm_multipath' May 8 00:52:37.824086 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:37.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.825775 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:37.829365 kernel: audit: type=1130 audit(1746665557.824:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.835274 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:37.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.839863 kernel: audit: type=1130 audit(1746665557.836:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.872868 kernel: Loading iSCSI transport class v2.0-870. May 8 00:52:37.890863 kernel: iscsi: registered transport (tcp) May 8 00:52:37.905203 kernel: iscsi: registered transport (qla4xxx) May 8 00:52:37.905217 kernel: QLogic iSCSI HBA Driver May 8 00:52:37.939082 systemd[1]: Finished dracut-cmdline.service. May 8 00:52:37.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.942889 kernel: audit: type=1130 audit(1746665557.939:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:37.940753 systemd[1]: Starting dracut-pre-udev.service... May 8 00:52:37.982867 kernel: raid6: neonx8 gen() 13816 MB/s May 8 00:52:37.999858 kernel: raid6: neonx8 xor() 10814 MB/s May 8 00:52:38.016859 kernel: raid6: neonx4 gen() 13536 MB/s May 8 00:52:38.033854 kernel: raid6: neonx4 xor() 11257 MB/s May 8 00:52:38.050851 kernel: raid6: neonx2 gen() 12938 MB/s May 8 00:52:38.067858 kernel: raid6: neonx2 xor() 10612 MB/s May 8 00:52:38.084850 kernel: raid6: neonx1 gen() 10504 MB/s May 8 00:52:38.101856 kernel: raid6: neonx1 xor() 8769 MB/s May 8 00:52:38.118854 kernel: raid6: int64x8 gen() 6246 MB/s May 8 00:52:38.135854 kernel: raid6: int64x8 xor() 3538 MB/s May 8 00:52:38.152857 kernel: raid6: int64x4 gen() 7231 MB/s May 8 00:52:38.169854 kernel: raid6: int64x4 xor() 3850 MB/s May 8 00:52:38.186854 kernel: raid6: int64x2 gen() 6142 MB/s May 8 00:52:38.203853 kernel: raid6: int64x2 xor() 3315 MB/s May 8 00:52:38.220854 kernel: raid6: int64x1 gen() 5039 MB/s May 8 00:52:38.237975 kernel: raid6: int64x1 xor() 2641 MB/s May 8 00:52:38.237997 kernel: raid6: using algorithm neonx8 gen() 13816 MB/s May 8 00:52:38.238006 kernel: raid6: .... xor() 10814 MB/s, rmw enabled May 8 00:52:38.239061 kernel: raid6: using neon recovery algorithm May 8 00:52:38.250864 kernel: xor: measuring software checksum speed May 8 00:52:38.250892 kernel: 8regs : 17206 MB/sec May 8 00:52:38.252046 kernel: 32regs : 18403 MB/sec May 8 00:52:38.252075 kernel: arm64_neon : 27542 MB/sec May 8 00:52:38.252100 kernel: xor: using function: arm64_neon (27542 MB/sec) May 8 00:52:38.308862 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 8 00:52:38.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:38.318653 systemd[1]: Finished dracut-pre-udev.service. May 8 00:52:38.321000 audit: BPF prog-id=7 op=LOAD May 8 00:52:38.321000 audit: BPF prog-id=8 op=LOAD May 8 00:52:38.322853 kernel: audit: type=1130 audit(1746665558.318:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:38.323312 systemd[1]: Starting systemd-udevd.service... May 8 00:52:38.337399 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 8 00:52:38.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:38.340672 systemd[1]: Started systemd-udevd.service. May 8 00:52:38.342230 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:52:38.357531 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation May 8 00:52:38.388157 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:52:38.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:38.393424 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:38.434367 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:38.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:38.469852 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:52:38.474144 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:52:38.474158 kernel: GPT:9289727 != 19775487 May 8 00:52:38.474167 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:52:38.474176 kernel: GPT:9289727 != 19775487 May 8 00:52:38.474184 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:52:38.474193 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:38.486854 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (551) May 8 00:52:38.489149 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:52:38.492013 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:52:38.493057 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:52:38.497614 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:52:38.504806 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:38.506474 systemd[1]: Starting disk-uuid.service... May 8 00:52:38.512266 disk-uuid[563]: Primary Header is updated. May 8 00:52:38.512266 disk-uuid[563]: Secondary Entries is updated. May 8 00:52:38.512266 disk-uuid[563]: Secondary Header is updated. May 8 00:52:38.515855 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:39.527248 disk-uuid[564]: The operation has completed successfully. May 8 00:52:39.528337 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:52:39.549203 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:52:39.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.549303 systemd[1]: Finished disk-uuid.service. May 8 00:52:39.550821 systemd[1]: Starting verity-setup.service... May 8 00:52:39.565855 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 8 00:52:39.587173 systemd[1]: Found device dev-mapper-usr.device. May 8 00:52:39.589345 systemd[1]: Mounting sysusr-usr.mount... May 8 00:52:39.592152 systemd[1]: Finished verity-setup.service. May 8 00:52:39.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.634853 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:52:39.635336 systemd[1]: Mounted sysusr-usr.mount. May 8 00:52:39.636182 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:52:39.636929 systemd[1]: Starting ignition-setup.service... May 8 00:52:39.639111 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:52:39.645201 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:52:39.645231 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:39.645246 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:39.653885 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:52:39.659298 systemd[1]: Finished ignition-setup.service. May 8 00:52:39.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.660871 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:52:39.722158 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:52:39.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.725000 audit: BPF prog-id=9 op=LOAD May 8 00:52:39.725954 systemd[1]: Starting systemd-networkd.service... May 8 00:52:39.740568 ignition[653]: Ignition 2.14.0 May 8 00:52:39.740579 ignition[653]: Stage: fetch-offline May 8 00:52:39.740617 ignition[653]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:39.740626 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:39.740764 ignition[653]: parsed url from cmdline: "" May 8 00:52:39.740767 ignition[653]: no config URL provided May 8 00:52:39.740771 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:52:39.740778 ignition[653]: no config at "/usr/lib/ignition/user.ign" May 8 00:52:39.740796 ignition[653]: op(1): [started] loading QEMU firmware config module May 8 00:52:39.740801 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:52:39.746949 ignition[653]: op(1): [finished] loading QEMU firmware config module May 8 00:52:39.749368 systemd-networkd[742]: lo: Link UP May 8 00:52:39.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.749372 systemd-networkd[742]: lo: Gained carrier May 8 00:52:39.749710 systemd-networkd[742]: Enumeration completed May 8 00:52:39.749818 systemd[1]: Started systemd-networkd.service. May 8 00:52:39.749907 systemd-networkd[742]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:39.750844 systemd-networkd[742]: eth0: Link UP May 8 00:52:39.750847 systemd-networkd[742]: eth0: Gained carrier May 8 00:52:39.751026 systemd[1]: Reached target network.target. May 8 00:52:39.753181 systemd[1]: Starting iscsiuio.service... May 8 00:52:39.761754 systemd[1]: Started iscsiuio.service. May 8 00:52:39.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.763714 systemd[1]: Starting iscsid.service... May 8 00:52:39.766959 iscsid[749]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:39.766959 iscsid[749]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:52:39.766959 iscsid[749]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:52:39.766959 iscsid[749]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:52:39.766959 iscsid[749]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:52:39.766959 iscsid[749]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:52:39.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.768547 systemd-networkd[742]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:39.769685 systemd[1]: Started iscsid.service. May 8 00:52:39.776523 systemd[1]: Starting dracut-initqueue.service... May 8 00:52:39.786376 systemd[1]: Finished dracut-initqueue.service. May 8 00:52:39.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.787367 systemd[1]: Reached target remote-fs-pre.target. May 8 00:52:39.788750 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:39.790395 systemd[1]: Reached target remote-fs.target. May 8 00:52:39.792626 systemd[1]: Starting dracut-pre-mount.service... May 8 00:52:39.799894 systemd[1]: Finished dracut-pre-mount.service. May 8 00:52:39.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.813686 ignition[653]: parsing config with SHA512: 6132eb25cb1226db67676acd92694d000054cf0c330eef6c598fc4341ba79bc7e9c5ac680def585f1bbb8662b5f0eaf51db1bfab5f9f239dadf88eea7b01f9fe May 8 00:52:39.820725 unknown[653]: fetched base config from "system" May 8 00:52:39.821383 ignition[653]: fetch-offline: fetch-offline passed May 8 00:52:39.820752 unknown[653]: fetched user config from "qemu" May 8 00:52:39.821459 ignition[653]: Ignition finished successfully May 8 00:52:39.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.822314 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:52:39.823407 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:52:39.824194 systemd[1]: Starting ignition-kargs.service... May 8 00:52:39.833569 ignition[763]: Ignition 2.14.0 May 8 00:52:39.833581 ignition[763]: Stage: kargs May 8 00:52:39.833682 ignition[763]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:39.833692 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:39.834601 ignition[763]: kargs: kargs passed May 8 00:52:39.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.836787 systemd[1]: Finished ignition-kargs.service. May 8 00:52:39.834645 ignition[763]: Ignition finished successfully May 8 00:52:39.839304 systemd[1]: Starting ignition-disks.service... May 8 00:52:39.846068 ignition[769]: Ignition 2.14.0 May 8 00:52:39.846079 ignition[769]: Stage: disks May 8 00:52:39.846168 ignition[769]: no configs at "/usr/lib/ignition/base.d" May 8 00:52:39.846177 ignition[769]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:39.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.848153 systemd[1]: Finished ignition-disks.service. May 8 00:52:39.847318 ignition[769]: disks: disks passed May 8 00:52:39.849140 systemd[1]: Reached target initrd-root-device.target. May 8 00:52:39.847363 ignition[769]: Ignition finished successfully May 8 00:52:39.850800 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:39.852174 systemd[1]: Reached target local-fs.target. May 8 00:52:39.853374 systemd[1]: Reached target sysinit.target. May 8 00:52:39.854703 systemd[1]: Reached target basic.target. May 8 00:52:39.856980 systemd[1]: Starting systemd-fsck-root.service... May 8 00:52:39.874278 systemd-fsck[777]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 8 00:52:39.964201 systemd[1]: Finished systemd-fsck-root.service. May 8 00:52:39.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:39.966034 systemd[1]: Mounting sysroot.mount... May 8 00:52:39.979891 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:52:39.980332 systemd[1]: Mounted sysroot.mount. May 8 00:52:39.981096 systemd[1]: Reached target initrd-root-fs.target. May 8 00:52:39.983306 systemd[1]: Mounting sysroot-usr.mount... May 8 00:52:39.984160 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:52:39.984198 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:52:39.984221 systemd[1]: Reached target ignition-diskful.target. May 8 00:52:39.986186 systemd[1]: Mounted sysroot-usr.mount. May 8 00:52:39.987852 systemd[1]: Starting initrd-setup-root.service... May 8 00:52:39.991985 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:52:39.996782 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory May 8 00:52:40.001154 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:52:40.005060 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:52:40.032475 systemd[1]: Finished initrd-setup-root.service. May 8 00:52:40.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:40.034111 systemd[1]: Starting ignition-mount.service... May 8 00:52:40.035431 systemd[1]: Starting sysroot-boot.service... May 8 00:52:40.040100 bash[828]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:52:40.048923 ignition[830]: INFO : Ignition 2.14.0 May 8 00:52:40.048923 ignition[830]: INFO : Stage: mount May 8 00:52:40.051100 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:40.051100 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:40.051100 ignition[830]: INFO : mount: mount passed May 8 00:52:40.051100 ignition[830]: INFO : Ignition finished successfully May 8 00:52:40.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:40.051239 systemd[1]: Finished ignition-mount.service. May 8 00:52:40.059987 systemd[1]: Finished sysroot-boot.service. May 8 00:52:40.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:40.598486 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:52:40.605264 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (838) May 8 00:52:40.605298 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:52:40.605309 kernel: BTRFS info (device vda6): using free space tree May 8 00:52:40.605908 kernel: BTRFS info (device vda6): has skinny extents May 8 00:52:40.609151 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:52:40.610625 systemd[1]: Starting ignition-files.service... May 8 00:52:40.623588 ignition[858]: INFO : Ignition 2.14.0 May 8 00:52:40.623588 ignition[858]: INFO : Stage: files May 8 00:52:40.625178 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:40.625178 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:40.625178 ignition[858]: DEBUG : files: compiled without relabeling support, skipping May 8 00:52:40.628877 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:52:40.628877 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:52:40.631634 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:52:40.631634 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:52:40.634158 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:52:40.634158 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 8 00:52:40.634158 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 8 00:52:40.632957 unknown[858]: wrote ssh authorized keys file for user: core May 8 00:52:40.689687 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:52:40.854116 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 8 00:52:40.856151 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 May 8 00:52:41.158055 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:52:41.462984 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 8 00:52:41.465026 ignition[858]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:52:41.466350 ignition[858]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:41.494785 ignition[858]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:52:41.496405 ignition[858]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:52:41.496405 ignition[858]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 8 00:52:41.496405 ignition[858]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:52:41.496405 ignition[858]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:41.496405 ignition[858]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:52:41.496405 ignition[858]: INFO : files: files passed May 8 00:52:41.496405 ignition[858]: INFO : Ignition finished successfully May 8 00:52:41.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.496456 systemd[1]: Finished ignition-files.service. May 8 00:52:41.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.499491 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:52:41.500683 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:52:41.514231 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:52:41.501352 systemd[1]: Starting ignition-quench.service... May 8 00:52:41.516585 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:52:41.501916 systemd-networkd[742]: eth0: Gained IPv6LL May 8 00:52:41.505779 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:52:41.505878 systemd[1]: Finished ignition-quench.service. May 8 00:52:41.507894 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:52:41.509616 systemd[1]: Reached target ignition-complete.target. May 8 00:52:41.511620 systemd[1]: Starting initrd-parse-etc.service... May 8 00:52:41.524646 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:52:41.524751 systemd[1]: Finished initrd-parse-etc.service. May 8 00:52:41.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.526617 systemd[1]: Reached target initrd-fs.target. May 8 00:52:41.527995 systemd[1]: Reached target initrd.target. May 8 00:52:41.529317 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:52:41.532586 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:52:41.543414 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:52:41.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.545180 systemd[1]: Starting initrd-cleanup.service... May 8 00:52:41.553446 systemd[1]: Stopped target nss-lookup.target. May 8 00:52:41.554373 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:52:41.555785 systemd[1]: Stopped target timers.target. May 8 00:52:41.557193 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:52:41.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.557316 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:52:41.558656 systemd[1]: Stopped target initrd.target. May 8 00:52:41.560140 systemd[1]: Stopped target basic.target. May 8 00:52:41.561435 systemd[1]: Stopped target ignition-complete.target. May 8 00:52:41.562786 systemd[1]: Stopped target ignition-diskful.target. May 8 00:52:41.564127 systemd[1]: Stopped target initrd-root-device.target. May 8 00:52:41.565604 systemd[1]: Stopped target remote-fs.target. May 8 00:52:41.566970 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:52:41.568480 systemd[1]: Stopped target sysinit.target. May 8 00:52:41.569793 systemd[1]: Stopped target local-fs.target. May 8 00:52:41.571147 systemd[1]: Stopped target local-fs-pre.target. May 8 00:52:41.572468 systemd[1]: Stopped target swap.target. May 8 00:52:41.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.573665 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:52:41.573785 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:52:41.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.575132 systemd[1]: Stopped target cryptsetup.target. May 8 00:52:41.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.576379 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:52:41.576481 systemd[1]: Stopped dracut-initqueue.service. May 8 00:52:41.577952 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:52:41.578045 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:52:41.579415 systemd[1]: Stopped target paths.target. May 8 00:52:41.580622 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:52:41.583874 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:52:41.584810 systemd[1]: Stopped target slices.target. May 8 00:52:41.586094 systemd[1]: Stopped target sockets.target. May 8 00:52:41.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.587609 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:52:41.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.587678 systemd[1]: Closed iscsid.socket. May 8 00:52:41.588937 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:52:41.589038 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:52:41.590430 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:52:41.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.590520 systemd[1]: Stopped ignition-files.service. May 8 00:52:41.592583 systemd[1]: Stopping ignition-mount.service... May 8 00:52:41.593777 systemd[1]: Stopping iscsiuio.service... May 8 00:52:41.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.601594 ignition[898]: INFO : Ignition 2.14.0 May 8 00:52:41.601594 ignition[898]: INFO : Stage: umount May 8 00:52:41.601594 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:52:41.601594 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:52:41.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.595786 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:52:41.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.608080 ignition[898]: INFO : umount: umount passed May 8 00:52:41.608080 ignition[898]: INFO : Ignition finished successfully May 8 00:52:41.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.595947 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:52:41.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.598320 systemd[1]: Stopping sysroot-boot.service... May 8 00:52:41.599533 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:52:41.599655 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:52:41.601039 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:52:41.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.601132 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:52:41.603742 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:52:41.603855 systemd[1]: Stopped iscsiuio.service. May 8 00:52:41.605517 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:52:41.605590 systemd[1]: Stopped ignition-mount.service. May 8 00:52:41.607489 systemd[1]: Stopped target network.target. May 8 00:52:41.608824 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:52:41.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.608873 systemd[1]: Closed iscsiuio.socket. May 8 00:52:41.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.610319 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:52:41.610365 systemd[1]: Stopped ignition-disks.service. May 8 00:52:41.611220 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:52:41.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.611261 systemd[1]: Stopped ignition-kargs.service. May 8 00:52:41.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.612058 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:52:41.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.640000 audit: BPF prog-id=6 op=UNLOAD May 8 00:52:41.612094 systemd[1]: Stopped ignition-setup.service. May 8 00:52:41.613646 systemd[1]: Stopping systemd-networkd.service... May 8 00:52:41.615860 systemd[1]: Stopping systemd-resolved.service... May 8 00:52:41.617784 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:52:41.618257 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:52:41.618350 systemd[1]: Finished initrd-cleanup.service. May 8 00:52:41.624365 systemd-networkd[742]: eth0: DHCPv6 lease lost May 8 00:52:41.647000 audit: BPF prog-id=9 op=UNLOAD May 8 00:52:41.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.626355 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:52:41.626602 systemd[1]: Stopped systemd-networkd.service. May 8 00:52:41.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.628599 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:52:41.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.628701 systemd[1]: Stopped systemd-resolved.service. May 8 00:52:41.632325 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:52:41.632354 systemd[1]: Closed systemd-networkd.socket. May 8 00:52:41.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.633948 systemd[1]: Stopping network-cleanup.service... May 8 00:52:41.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.634738 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:52:41.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.634802 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:52:41.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.636260 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:52:41.636310 systemd[1]: Stopped systemd-sysctl.service. May 8 00:52:41.638485 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:52:41.638527 systemd[1]: Stopped systemd-modules-load.service. May 8 00:52:41.639648 systemd[1]: Stopping systemd-udevd.service... May 8 00:52:41.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.643152 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:52:41.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.647268 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:52:41.647397 systemd[1]: Stopped network-cleanup.service. May 8 00:52:41.650262 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:52:41.650401 systemd[1]: Stopped systemd-udevd.service. May 8 00:52:41.652189 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:52:41.652273 systemd[1]: Stopped sysroot-boot.service. May 8 00:52:41.653413 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:52:41.653451 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:52:41.654853 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:52:41.654886 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:52:41.656278 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:52:41.656336 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:52:41.657783 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:52:41.657825 systemd[1]: Stopped dracut-cmdline.service. May 8 00:52:41.659081 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:52:41.659120 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:52:41.660462 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:52:41.660503 systemd[1]: Stopped initrd-setup-root.service. May 8 00:52:41.662900 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:52:41.664448 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:52:41.664510 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:52:41.668251 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:52:41.668360 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:52:41.669448 systemd[1]: Reached target initrd-switch-root.target. May 8 00:52:41.671980 systemd[1]: Starting initrd-switch-root.service... May 8 00:52:41.678452 systemd[1]: Switching root. May 8 00:52:41.700365 iscsid[749]: iscsid shutting down. May 8 00:52:41.701033 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 8 00:52:41.701085 systemd-journald[290]: Journal stopped May 8 00:52:43.683300 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:52:43.683377 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:52:43.683390 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:52:43.683404 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:52:43.683414 kernel: SELinux: policy capability open_perms=1 May 8 00:52:43.683424 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:52:43.683434 kernel: SELinux: policy capability always_check_network=0 May 8 00:52:43.683446 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:52:43.683455 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:52:43.683465 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:52:43.683474 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:52:43.683484 systemd[1]: Successfully loaded SELinux policy in 32.893ms. May 8 00:52:43.683504 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.821ms. May 8 00:52:43.683515 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:52:43.683526 systemd[1]: Detected virtualization kvm. May 8 00:52:43.683537 systemd[1]: Detected architecture arm64. May 8 00:52:43.683547 systemd[1]: Detected first boot. May 8 00:52:43.683557 systemd[1]: Initializing machine ID from VM UUID. May 8 00:52:43.683569 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:52:43.683579 systemd[1]: Populated /etc with preset unit settings. May 8 00:52:43.683590 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:43.683605 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:43.683617 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:43.683630 kernel: kauditd_printk_skb: 79 callbacks suppressed May 8 00:52:43.683639 kernel: audit: type=1334 audit(1746665563.544:83): prog-id=12 op=LOAD May 8 00:52:43.683649 kernel: audit: type=1334 audit(1746665563.544:84): prog-id=3 op=UNLOAD May 8 00:52:43.683659 kernel: audit: type=1334 audit(1746665563.545:85): prog-id=13 op=LOAD May 8 00:52:43.683668 kernel: audit: type=1334 audit(1746665563.546:86): prog-id=14 op=LOAD May 8 00:52:43.683677 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:52:43.683687 kernel: audit: type=1334 audit(1746665563.546:87): prog-id=4 op=UNLOAD May 8 00:52:43.683697 systemd[1]: Stopped iscsid.service. May 8 00:52:43.683708 kernel: audit: type=1334 audit(1746665563.546:88): prog-id=5 op=UNLOAD May 8 00:52:43.683719 kernel: audit: type=1131 audit(1746665563.547:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.683729 kernel: audit: type=1131 audit(1746665563.555:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.683739 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:52:43.683750 systemd[1]: Stopped initrd-switch-root.service. May 8 00:52:43.683763 kernel: audit: type=1130 audit(1746665563.559:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.683773 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:52:43.683783 kernel: audit: type=1131 audit(1746665563.559:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.683796 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:52:43.683807 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:52:43.683818 systemd[1]: Created slice system-getty.slice. May 8 00:52:43.683828 systemd[1]: Created slice system-modprobe.slice. May 8 00:52:43.683862 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:52:43.683873 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:52:43.683884 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:52:43.683895 systemd[1]: Created slice user.slice. May 8 00:52:43.683906 systemd[1]: Started systemd-ask-password-console.path. May 8 00:52:43.683916 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:52:43.683926 systemd[1]: Set up automount boot.automount. May 8 00:52:43.683937 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:52:43.683947 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:52:43.683960 systemd[1]: Stopped target initrd-fs.target. May 8 00:52:43.683971 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:52:43.683981 systemd[1]: Reached target integritysetup.target. May 8 00:52:43.683992 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:52:43.684002 systemd[1]: Reached target remote-fs.target. May 8 00:52:43.684013 systemd[1]: Reached target slices.target. May 8 00:52:43.684024 systemd[1]: Reached target swap.target. May 8 00:52:43.684034 systemd[1]: Reached target torcx.target. May 8 00:52:43.684044 systemd[1]: Reached target veritysetup.target. May 8 00:52:43.684054 systemd[1]: Listening on systemd-coredump.socket. May 8 00:52:43.684067 systemd[1]: Listening on systemd-initctl.socket. May 8 00:52:43.684078 systemd[1]: Listening on systemd-networkd.socket. May 8 00:52:43.684088 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:52:43.684098 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:52:43.684108 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:52:43.684119 systemd[1]: Mounting dev-hugepages.mount... May 8 00:52:43.684131 systemd[1]: Mounting dev-mqueue.mount... May 8 00:52:43.684142 systemd[1]: Mounting media.mount... May 8 00:52:43.684152 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:52:43.684170 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:52:43.684182 systemd[1]: Mounting tmp.mount... May 8 00:52:43.684193 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:52:43.684204 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:43.684215 systemd[1]: Starting kmod-static-nodes.service... May 8 00:52:43.684226 systemd[1]: Starting modprobe@configfs.service... May 8 00:52:43.684259 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:43.684282 systemd[1]: Starting modprobe@drm.service... May 8 00:52:43.684294 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:43.684306 systemd[1]: Starting modprobe@fuse.service... May 8 00:52:43.684322 systemd[1]: Starting modprobe@loop.service... May 8 00:52:43.684334 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:52:43.684348 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:52:43.684360 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:52:43.684370 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:52:43.684381 kernel: fuse: init (API version 7.34) May 8 00:52:43.684392 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:52:43.684403 systemd[1]: Stopped systemd-journald.service. May 8 00:52:43.684420 kernel: loop: module loaded May 8 00:52:43.684431 systemd[1]: Starting systemd-journald.service... May 8 00:52:43.684441 systemd[1]: Starting systemd-modules-load.service... May 8 00:52:43.684454 systemd[1]: Starting systemd-network-generator.service... May 8 00:52:43.684464 systemd[1]: Starting systemd-remount-fs.service... May 8 00:52:43.684475 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:52:43.684486 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:52:43.684497 systemd[1]: Stopped verity-setup.service. May 8 00:52:43.684508 systemd[1]: Mounted dev-hugepages.mount. May 8 00:52:43.684523 systemd[1]: Mounted dev-mqueue.mount. May 8 00:52:43.684536 systemd[1]: Mounted media.mount. May 8 00:52:43.684549 systemd-journald[1001]: Journal started May 8 00:52:43.684593 systemd-journald[1001]: Runtime Journal (/run/log/journal/e05ac0f867114bb78f7d0c0fc09c1e17) is 6.0M, max 48.7M, 42.6M free. May 8 00:52:41.756000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:52:41.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:41.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:52:41.839000 audit: BPF prog-id=10 op=LOAD May 8 00:52:41.839000 audit: BPF prog-id=10 op=UNLOAD May 8 00:52:41.839000 audit: BPF prog-id=11 op=LOAD May 8 00:52:41.839000 audit: BPF prog-id=11 op=UNLOAD May 8 00:52:41.875000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:52:41.875000 audit[931]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400010c524 a1=4000108540 a2=400010a9c0 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.875000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:41.876000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:52:41.876000 audit[931]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400010c5f9 a2=1ed a3=0 items=2 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.876000 audit: CWD cwd="/" May 8 00:52:41.876000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.876000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.876000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:52:43.544000 audit: BPF prog-id=12 op=LOAD May 8 00:52:43.544000 audit: BPF prog-id=3 op=UNLOAD May 8 00:52:43.545000 audit: BPF prog-id=13 op=LOAD May 8 00:52:43.546000 audit: BPF prog-id=14 op=LOAD May 8 00:52:43.546000 audit: BPF prog-id=4 op=UNLOAD May 8 00:52:43.546000 audit: BPF prog-id=5 op=UNLOAD May 8 00:52:43.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.568000 audit: BPF prog-id=12 op=UNLOAD May 8 00:52:43.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.661000 audit: BPF prog-id=15 op=LOAD May 8 00:52:43.661000 audit: BPF prog-id=16 op=LOAD May 8 00:52:43.661000 audit: BPF prog-id=17 op=LOAD May 8 00:52:43.661000 audit: BPF prog-id=13 op=UNLOAD May 8 00:52:43.661000 audit: BPF prog-id=14 op=UNLOAD May 8 00:52:43.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.681000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:52:43.681000 audit[1001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffda9f54b0 a2=4000 a3=1 items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:43.681000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:52:41.874860 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:43.543342 systemd[1]: Queued start job for default target multi-user.target. May 8 00:52:41.875106 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:43.543355 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:52:41.875125 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:43.547801 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:52:41.875154 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:52:41.875163 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:52:41.875189 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:52:43.686210 systemd[1]: Started systemd-journald.service. May 8 00:52:41.875200 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:52:41.875409 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:52:43.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.875486 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:52:41.875497 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:52:41.875919 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:52:41.875950 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:52:43.686671 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:52:41.875968 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:52:41.875982 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:52:41.875999 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:52:41.876012 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:52:43.298444 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:43.298705 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:43.298815 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:43.299006 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:52:43.299057 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:52:43.299112 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-08T00:52:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:52:43.687720 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:52:43.688655 systemd[1]: Mounted tmp.mount. May 8 00:52:43.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.689581 systemd[1]: Finished kmod-static-nodes.service. May 8 00:52:43.690653 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:52:43.690789 systemd[1]: Finished modprobe@configfs.service. May 8 00:52:43.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.691936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:43.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.692301 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:43.693495 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:43.693646 systemd[1]: Finished modprobe@drm.service. May 8 00:52:43.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.694659 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:43.694820 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:43.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.695951 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:52:43.696094 systemd[1]: Finished modprobe@fuse.service. May 8 00:52:43.697093 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:43.697227 systemd[1]: Finished modprobe@loop.service. May 8 00:52:43.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.698298 systemd[1]: Finished systemd-modules-load.service. May 8 00:52:43.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.699531 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:52:43.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.700812 systemd[1]: Finished systemd-network-generator.service. May 8 00:52:43.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.702030 systemd[1]: Finished systemd-remount-fs.service. May 8 00:52:43.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.703480 systemd[1]: Reached target network-pre.target. May 8 00:52:43.705533 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:52:43.707543 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:52:43.708290 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:52:43.709677 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:52:43.711568 systemd[1]: Starting systemd-journal-flush.service... May 8 00:52:43.712520 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:43.713478 systemd[1]: Starting systemd-random-seed.service... May 8 00:52:43.714339 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:43.715334 systemd[1]: Starting systemd-sysctl.service... May 8 00:52:43.718229 systemd[1]: Starting systemd-sysusers.service... May 8 00:52:43.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.721378 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:52:43.722532 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:52:43.723684 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:52:43.724175 systemd-journald[1001]: Time spent on flushing to /var/log/journal/e05ac0f867114bb78f7d0c0fc09c1e17 is 12.292ms for 990 entries. May 8 00:52:43.724175 systemd-journald[1001]: System Journal (/var/log/journal/e05ac0f867114bb78f7d0c0fc09c1e17) is 8.0M, max 195.6M, 187.6M free. May 8 00:52:43.756097 systemd-journald[1001]: Received client request to flush runtime journal. May 8 00:52:43.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:43.727744 systemd[1]: Starting systemd-udev-settle.service... May 8 00:52:43.757211 udevadm[1031]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:52:43.732771 systemd[1]: Finished systemd-random-seed.service. May 8 00:52:43.733817 systemd[1]: Reached target first-boot-complete.target. May 8 00:52:43.740214 systemd[1]: Finished systemd-sysctl.service. May 8 00:52:43.751517 systemd[1]: Finished systemd-sysusers.service. May 8 00:52:43.757099 systemd[1]: Finished systemd-journal-flush.service. May 8 00:52:43.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.075252 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:52:44.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.075000 audit: BPF prog-id=18 op=LOAD May 8 00:52:44.076000 audit: BPF prog-id=19 op=LOAD May 8 00:52:44.076000 audit: BPF prog-id=7 op=UNLOAD May 8 00:52:44.076000 audit: BPF prog-id=8 op=UNLOAD May 8 00:52:44.077600 systemd[1]: Starting systemd-udevd.service... May 8 00:52:44.099223 systemd-udevd[1035]: Using default interface naming scheme 'v252'. May 8 00:52:44.110774 systemd[1]: Started systemd-udevd.service. May 8 00:52:44.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.111000 audit: BPF prog-id=20 op=LOAD May 8 00:52:44.113443 systemd[1]: Starting systemd-networkd.service... May 8 00:52:44.120000 audit: BPF prog-id=21 op=LOAD May 8 00:52:44.120000 audit: BPF prog-id=22 op=LOAD May 8 00:52:44.120000 audit: BPF prog-id=23 op=LOAD May 8 00:52:44.122034 systemd[1]: Starting systemd-userdbd.service... May 8 00:52:44.141746 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 8 00:52:44.156640 systemd[1]: Started systemd-userdbd.service. May 8 00:52:44.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.195330 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:52:44.210353 systemd-networkd[1044]: lo: Link UP May 8 00:52:44.210363 systemd-networkd[1044]: lo: Gained carrier May 8 00:52:44.210709 systemd-networkd[1044]: Enumeration completed May 8 00:52:44.210810 systemd[1]: Started systemd-networkd.service. May 8 00:52:44.210811 systemd-networkd[1044]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:52:44.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.213222 systemd[1]: Finished systemd-udev-settle.service. May 8 00:52:44.213861 systemd-networkd[1044]: eth0: Link UP May 8 00:52:44.213872 systemd-networkd[1044]: eth0: Gained carrier May 8 00:52:44.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.215343 systemd[1]: Starting lvm2-activation-early.service... May 8 00:52:44.225568 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:44.235974 systemd-networkd[1044]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:52:44.253647 systemd[1]: Finished lvm2-activation-early.service. May 8 00:52:44.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.254718 systemd[1]: Reached target cryptsetup.target. May 8 00:52:44.256718 systemd[1]: Starting lvm2-activation.service... May 8 00:52:44.259947 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:52:44.287580 systemd[1]: Finished lvm2-activation.service. May 8 00:52:44.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.288560 systemd[1]: Reached target local-fs-pre.target. May 8 00:52:44.289411 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:52:44.289442 systemd[1]: Reached target local-fs.target. May 8 00:52:44.290223 systemd[1]: Reached target machines.target. May 8 00:52:44.292175 systemd[1]: Starting ldconfig.service... May 8 00:52:44.293218 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:44.293271 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.294335 systemd[1]: Starting systemd-boot-update.service... May 8 00:52:44.296238 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:52:44.298337 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:52:44.301384 systemd[1]: Starting systemd-sysext.service... May 8 00:52:44.302547 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1071 (bootctl) May 8 00:52:44.303670 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:52:44.307934 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:52:44.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.318015 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:52:44.322376 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:52:44.322557 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:52:44.365935 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:52:44.366575 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:52:44.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.369857 kernel: loop0: detected capacity change from 0 to 189592 May 8 00:52:44.370373 systemd-fsck[1078]: fsck.fat 4.2 (2021-01-31) May 8 00:52:44.370373 systemd-fsck[1078]: /dev/vda1: 236 files, 117182/258078 clusters May 8 00:52:44.376504 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:52:44.378855 systemd[1]: Mounting boot.mount... May 8 00:52:44.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.383880 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:52:44.386737 systemd[1]: Mounted boot.mount. May 8 00:52:44.396128 systemd[1]: Finished systemd-boot-update.service. May 8 00:52:44.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.405853 kernel: loop1: detected capacity change from 0 to 189592 May 8 00:52:44.409824 (sd-sysext)[1085]: Using extensions 'kubernetes'. May 8 00:52:44.410231 (sd-sysext)[1085]: Merged extensions into '/usr'. May 8 00:52:44.426087 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:44.427602 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:44.429908 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:44.432198 systemd[1]: Starting modprobe@loop.service... May 8 00:52:44.433453 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:44.433591 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.434427 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:44.434549 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:44.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.435946 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:44.436062 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:44.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.437482 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:44.437611 systemd[1]: Finished modprobe@loop.service. May 8 00:52:44.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.439075 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:44.439169 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:44.468709 ldconfig[1070]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:52:44.471807 systemd[1]: Finished ldconfig.service. May 8 00:52:44.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.682143 systemd[1]: Mounting usr-share-oem.mount... May 8 00:52:44.687548 systemd[1]: Mounted usr-share-oem.mount. May 8 00:52:44.689509 systemd[1]: Finished systemd-sysext.service. May 8 00:52:44.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.692468 systemd[1]: Starting ensure-sysext.service... May 8 00:52:44.694238 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:52:44.698392 systemd[1]: Reloading. May 8 00:52:44.708794 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:52:44.711474 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:52:44.715197 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:52:44.730670 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-08T00:52:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:44.730696 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-08T00:52:44Z" level=info msg="torcx already run" May 8 00:52:44.793618 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:44.793638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:44.809084 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:44.849000 audit: BPF prog-id=24 op=LOAD May 8 00:52:44.849000 audit: BPF prog-id=21 op=UNLOAD May 8 00:52:44.849000 audit: BPF prog-id=25 op=LOAD May 8 00:52:44.849000 audit: BPF prog-id=26 op=LOAD May 8 00:52:44.849000 audit: BPF prog-id=22 op=UNLOAD May 8 00:52:44.849000 audit: BPF prog-id=23 op=UNLOAD May 8 00:52:44.850000 audit: BPF prog-id=27 op=LOAD May 8 00:52:44.850000 audit: BPF prog-id=28 op=LOAD May 8 00:52:44.850000 audit: BPF prog-id=18 op=UNLOAD May 8 00:52:44.850000 audit: BPF prog-id=19 op=UNLOAD May 8 00:52:44.851000 audit: BPF prog-id=29 op=LOAD May 8 00:52:44.851000 audit: BPF prog-id=20 op=UNLOAD May 8 00:52:44.853000 audit: BPF prog-id=30 op=LOAD May 8 00:52:44.853000 audit: BPF prog-id=15 op=UNLOAD May 8 00:52:44.853000 audit: BPF prog-id=31 op=LOAD May 8 00:52:44.853000 audit: BPF prog-id=32 op=LOAD May 8 00:52:44.853000 audit: BPF prog-id=16 op=UNLOAD May 8 00:52:44.853000 audit: BPF prog-id=17 op=UNLOAD May 8 00:52:44.856309 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:52:44.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.860691 systemd[1]: Starting audit-rules.service... May 8 00:52:44.862564 systemd[1]: Starting clean-ca-certificates.service... May 8 00:52:44.864827 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:52:44.867000 audit: BPF prog-id=33 op=LOAD May 8 00:52:44.868879 systemd[1]: Starting systemd-resolved.service... May 8 00:52:44.870000 audit: BPF prog-id=34 op=LOAD May 8 00:52:44.873465 systemd[1]: Starting systemd-timesyncd.service... May 8 00:52:44.875352 systemd[1]: Starting systemd-update-utmp.service... May 8 00:52:44.878280 systemd[1]: Finished clean-ca-certificates.service. May 8 00:52:44.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.879000 audit[1162]: SYSTEM_BOOT pid=1162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:52:44.882460 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:44.883698 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:44.885743 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:44.887737 systemd[1]: Starting modprobe@loop.service... May 8 00:52:44.888552 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:44.888718 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.888880 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:44.890026 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:44.890150 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:44.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.891522 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:44.891632 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:44.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.893027 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:44.893137 systemd[1]: Finished modprobe@loop.service. May 8 00:52:44.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.894475 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:44.894592 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:44.895645 systemd[1]: Finished systemd-update-utmp.service. May 8 00:52:44.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.897988 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:44.901194 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:44.903352 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:44.905278 systemd[1]: Starting modprobe@loop.service... May 8 00:52:44.906057 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:44.906182 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.906281 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:44.907276 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:52:44.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.908753 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:44.908878 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:44.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.910229 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:44.910359 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:44.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.911618 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:44.911728 systemd[1]: Finished modprobe@loop.service. May 8 00:52:44.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:44.913152 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:44.913251 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:44.912000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:52:44.912000 audit[1178]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcf09c860 a2=420 a3=0 items=0 ppid=1151 pid=1178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:44.912000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:52:44.913855 augenrules[1178]: No rules May 8 00:52:44.914558 systemd[1]: Starting systemd-update-done.service... May 8 00:52:44.916197 systemd[1]: Finished audit-rules.service. May 8 00:52:44.919454 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:52:44.920996 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:52:44.922960 systemd[1]: Starting modprobe@drm.service... May 8 00:52:44.924931 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:52:44.926876 systemd[1]: Starting modprobe@loop.service... May 8 00:52:44.927802 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:52:44.927943 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.929407 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:52:44.929838 systemd-resolved[1155]: Positive Trust Anchors: May 8 00:52:44.929857 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:52:44.929884 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:52:44.930599 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:52:44.932405 systemd[1]: Finished systemd-update-done.service. May 8 00:52:44.933862 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:52:44.933992 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:52:44.935221 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:52:44.935350 systemd[1]: Finished modprobe@drm.service. May 8 00:52:44.936653 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:52:44.936778 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:52:44.938390 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:52:44.938509 systemd[1]: Finished modprobe@loop.service. May 8 00:52:44.939960 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:52:44.940052 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:52:44.941056 systemd[1]: Finished ensure-sysext.service. May 8 00:52:44.942453 systemd-resolved[1155]: Defaulting to hostname 'linux'. May 8 00:52:44.943873 systemd[1]: Started systemd-resolved.service. May 8 00:52:44.944758 systemd[1]: Started systemd-timesyncd.service. May 8 00:52:44.945164 systemd-timesyncd[1160]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:52:44.945418 systemd-timesyncd[1160]: Initial clock synchronization to Thu 2025-05-08 00:52:45.339329 UTC. May 8 00:52:44.946008 systemd[1]: Reached target network.target. May 8 00:52:44.946751 systemd[1]: Reached target nss-lookup.target. May 8 00:52:44.947574 systemd[1]: Reached target sysinit.target. May 8 00:52:44.948420 systemd[1]: Started motdgen.path. May 8 00:52:44.949137 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:52:44.950193 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:52:44.951092 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:52:44.951126 systemd[1]: Reached target paths.target. May 8 00:52:44.951897 systemd[1]: Reached target time-set.target. May 8 00:52:44.952849 systemd[1]: Started logrotate.timer. May 8 00:52:44.953659 systemd[1]: Started mdadm.timer. May 8 00:52:44.954357 systemd[1]: Reached target timers.target. May 8 00:52:44.955459 systemd[1]: Listening on dbus.socket. May 8 00:52:44.957280 systemd[1]: Starting docker.socket... May 8 00:52:44.960535 systemd[1]: Listening on sshd.socket. May 8 00:52:44.961473 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.961961 systemd[1]: Listening on docker.socket. May 8 00:52:44.962799 systemd[1]: Reached target sockets.target. May 8 00:52:44.963605 systemd[1]: Reached target basic.target. May 8 00:52:44.964420 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:44.964449 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:52:44.965490 systemd[1]: Starting containerd.service... May 8 00:52:44.967243 systemd[1]: Starting dbus.service... May 8 00:52:44.968921 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:52:44.970828 systemd[1]: Starting extend-filesystems.service... May 8 00:52:44.971765 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:52:44.973146 systemd[1]: Starting motdgen.service... May 8 00:52:44.975178 systemd[1]: Starting prepare-helm.service... May 8 00:52:44.977725 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:52:44.980040 systemd[1]: Starting sshd-keygen.service... May 8 00:52:44.982555 jq[1194]: false May 8 00:52:44.985790 systemd[1]: Starting systemd-logind.service... May 8 00:52:44.986615 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:52:44.986679 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:52:44.987214 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:52:44.987890 systemd[1]: Starting update-engine.service... May 8 00:52:44.988532 extend-filesystems[1195]: Found loop1 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda May 8 00:52:44.988532 extend-filesystems[1195]: Found vda1 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda2 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda3 May 8 00:52:44.988532 extend-filesystems[1195]: Found usr May 8 00:52:44.988532 extend-filesystems[1195]: Found vda4 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda6 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda7 May 8 00:52:44.988532 extend-filesystems[1195]: Found vda9 May 8 00:52:44.988532 extend-filesystems[1195]: Checking size of /dev/vda9 May 8 00:52:44.989829 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:52:44.994851 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:52:45.025713 jq[1211]: true May 8 00:52:44.995044 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:52:45.028466 extend-filesystems[1195]: Resized partition /dev/vda9 May 8 00:52:44.996372 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:52:45.032352 tar[1213]: linux-arm64/helm May 8 00:52:44.996551 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:52:45.032733 jq[1218]: true May 8 00:52:45.017662 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:52:45.017849 systemd[1]: Finished motdgen.service. May 8 00:52:45.040955 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:52:45.053868 dbus-daemon[1193]: [system] SELinux support is enabled May 8 00:52:45.054054 systemd[1]: Started dbus.service. May 8 00:52:45.056498 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:52:45.056530 systemd[1]: Reached target system-config.target. May 8 00:52:45.057514 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:52:45.057537 systemd[1]: Reached target user-config.target. May 8 00:52:45.064943 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:52:45.080572 update_engine[1207]: I0508 00:52:45.080302 1207 main.cc:92] Flatcar Update Engine starting May 8 00:52:45.083071 update_engine[1207]: I0508 00:52:45.083047 1207 update_check_scheduler.cc:74] Next update check in 2m46s May 8 00:52:45.083106 systemd[1]: Started update-engine.service. May 8 00:52:45.085628 systemd[1]: Started locksmithd.service. May 8 00:52:45.096964 systemd-logind[1206]: Watching system buttons on /dev/input/event0 (Power Button) May 8 00:52:45.098161 systemd-logind[1206]: New seat seat0. May 8 00:52:45.106336 systemd[1]: Started systemd-logind.service. May 8 00:52:45.107018 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:52:45.121944 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:52:45.121944 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:52:45.121944 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:52:45.127047 extend-filesystems[1195]: Resized filesystem in /dev/vda9 May 8 00:52:45.124088 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:52:45.128218 env[1219]: time="2025-05-08T00:52:45.128099292Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:52:45.124277 systemd[1]: Finished extend-filesystems.service. May 8 00:52:45.128888 bash[1244]: Updated "/home/core/.ssh/authorized_keys" May 8 00:52:45.129304 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:52:45.148130 env[1219]: time="2025-05-08T00:52:45.148088068Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:52:45.148273 env[1219]: time="2025-05-08T00:52:45.148253477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.150925 env[1219]: time="2025-05-08T00:52:45.150893800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:45.150968 env[1219]: time="2025-05-08T00:52:45.150925572Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.151147 env[1219]: time="2025-05-08T00:52:45.151121536Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:45.151191 env[1219]: time="2025-05-08T00:52:45.151146131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.151191 env[1219]: time="2025-05-08T00:52:45.151160527Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:52:45.151191 env[1219]: time="2025-05-08T00:52:45.151170474Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.151249 env[1219]: time="2025-05-08T00:52:45.151239810Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.151608 env[1219]: time="2025-05-08T00:52:45.151581876Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:52:45.151734 env[1219]: time="2025-05-08T00:52:45.151712700Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:52:45.151734 env[1219]: time="2025-05-08T00:52:45.151732048Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:52:45.151809 env[1219]: time="2025-05-08T00:52:45.151790766Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:52:45.151809 env[1219]: time="2025-05-08T00:52:45.151806673Z" level=info msg="metadata content store policy set" policy=shared May 8 00:52:45.156141 env[1219]: time="2025-05-08T00:52:45.156111028Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:52:45.156194 env[1219]: time="2025-05-08T00:52:45.156146578Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:52:45.156194 env[1219]: time="2025-05-08T00:52:45.156161603Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:52:45.156194 env[1219]: time="2025-05-08T00:52:45.156190941Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156251 env[1219]: time="2025-05-08T00:52:45.156205337Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156251 env[1219]: time="2025-05-08T00:52:45.156218894Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156251 env[1219]: time="2025-05-08T00:52:45.156231611Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156593 env[1219]: time="2025-05-08T00:52:45.156569899Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156623 env[1219]: time="2025-05-08T00:52:45.156595375Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156623 env[1219]: time="2025-05-08T00:52:45.156610863Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156676 env[1219]: time="2025-05-08T00:52:45.156624965Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:52:45.156676 env[1219]: time="2025-05-08T00:52:45.156646958Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:52:45.156798 env[1219]: time="2025-05-08T00:52:45.156777614Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:52:45.156896 env[1219]: time="2025-05-08T00:52:45.156862900Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:52:45.157203 env[1219]: time="2025-05-08T00:52:45.157181629Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:52:45.157235 env[1219]: time="2025-05-08T00:52:45.157214282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157235 env[1219]: time="2025-05-08T00:52:45.157228385Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:52:45.157350 env[1219]: time="2025-05-08T00:52:45.157335369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157380 env[1219]: time="2025-05-08T00:52:45.157352620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157380 env[1219]: time="2025-05-08T00:52:45.157365966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157380 env[1219]: time="2025-05-08T00:52:45.157377089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157445 env[1219]: time="2025-05-08T00:52:45.157402481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157445 env[1219]: time="2025-05-08T00:52:45.157415870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157445 env[1219]: time="2025-05-08T00:52:45.157426867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157445 env[1219]: time="2025-05-08T00:52:45.157438031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157522 env[1219]: time="2025-05-08T00:52:45.157451546Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:52:45.157605 env[1219]: time="2025-05-08T00:52:45.157585140Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157636 env[1219]: time="2025-05-08T00:52:45.157606923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157636 env[1219]: time="2025-05-08T00:52:45.157620144Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157636 env[1219]: time="2025-05-08T00:52:45.157632190Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:52:45.157708 env[1219]: time="2025-05-08T00:52:45.157648013Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:52:45.157708 env[1219]: time="2025-05-08T00:52:45.157659051Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:52:45.157708 env[1219]: time="2025-05-08T00:52:45.157675840Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:52:45.157769 env[1219]: time="2025-05-08T00:52:45.157718147Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:52:45.157977 env[1219]: time="2025-05-08T00:52:45.157925358Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:52:45.158578 env[1219]: time="2025-05-08T00:52:45.157985125Z" level=info msg="Connect containerd service" May 8 00:52:45.158578 env[1219]: time="2025-05-08T00:52:45.158019332Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:52:45.158822 env[1219]: time="2025-05-08T00:52:45.158790720Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:52:45.159018 env[1219]: time="2025-05-08T00:52:45.158986893Z" level=info msg="Start subscribing containerd event" May 8 00:52:45.159061 env[1219]: time="2025-05-08T00:52:45.159038182Z" level=info msg="Start recovering state" May 8 00:52:45.159114 env[1219]: time="2025-05-08T00:52:45.159098369Z" level=info msg="Start event monitor" May 8 00:52:45.159141 env[1219]: time="2025-05-08T00:52:45.159122670Z" level=info msg="Start snapshots syncer" May 8 00:52:45.159141 env[1219]: time="2025-05-08T00:52:45.159133499Z" level=info msg="Start cni network conf syncer for default" May 8 00:52:45.159182 env[1219]: time="2025-05-08T00:52:45.159140844Z" level=info msg="Start streaming server" May 8 00:52:45.159536 env[1219]: time="2025-05-08T00:52:45.159498480Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:52:45.159579 env[1219]: time="2025-05-08T00:52:45.159560430Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:52:45.159752 systemd[1]: Started containerd.service. May 8 00:52:45.162920 env[1219]: time="2025-05-08T00:52:45.162861757Z" level=info msg="containerd successfully booted in 0.035800s" May 8 00:52:45.178776 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:52:45.448578 tar[1213]: linux-arm64/LICENSE May 8 00:52:45.448675 tar[1213]: linux-arm64/README.md May 8 00:52:45.453090 systemd[1]: Finished prepare-helm.service. May 8 00:52:46.240716 systemd-networkd[1044]: eth0: Gained IPv6LL May 8 00:52:46.242421 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:52:46.243770 systemd[1]: Reached target network-online.target. May 8 00:52:46.246436 systemd[1]: Starting kubelet.service... May 8 00:52:46.768625 systemd[1]: Started kubelet.service. May 8 00:52:47.241051 kubelet[1261]: E0508 00:52:47.240944 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:47.242562 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:47.242699 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:47.450635 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:52:47.469108 systemd[1]: Finished sshd-keygen.service. May 8 00:52:47.471430 systemd[1]: Starting issuegen.service... May 8 00:52:47.476043 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:52:47.476210 systemd[1]: Finished issuegen.service. May 8 00:52:47.478635 systemd[1]: Starting systemd-user-sessions.service... May 8 00:52:47.484940 systemd[1]: Finished systemd-user-sessions.service. May 8 00:52:47.487298 systemd[1]: Started getty@tty1.service. May 8 00:52:47.489357 systemd[1]: Started serial-getty@ttyAMA0.service. May 8 00:52:47.490428 systemd[1]: Reached target getty.target. May 8 00:52:47.491322 systemd[1]: Reached target multi-user.target. May 8 00:52:47.493429 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:52:47.500446 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:52:47.500609 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:52:47.501798 systemd[1]: Startup finished in 603ms (kernel) + 4.129s (initrd) + 5.779s (userspace) = 10.511s. May 8 00:52:50.708640 systemd[1]: Created slice system-sshd.slice. May 8 00:52:50.709832 systemd[1]: Started sshd@0-10.0.0.136:22-10.0.0.1:50230.service. May 8 00:52:50.753197 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 50230 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:50.755228 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:50.765976 systemd-logind[1206]: New session 1 of user core. May 8 00:52:50.766918 systemd[1]: Created slice user-500.slice. May 8 00:52:50.768069 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:52:50.776309 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:52:50.777632 systemd[1]: Starting user@500.service... May 8 00:52:50.780300 (systemd)[1287]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:50.839592 systemd[1287]: Queued start job for default target default.target. May 8 00:52:50.840112 systemd[1287]: Reached target paths.target. May 8 00:52:50.840132 systemd[1287]: Reached target sockets.target. May 8 00:52:50.840143 systemd[1287]: Reached target timers.target. May 8 00:52:50.840153 systemd[1287]: Reached target basic.target. May 8 00:52:50.840206 systemd[1287]: Reached target default.target. May 8 00:52:50.840232 systemd[1287]: Startup finished in 54ms. May 8 00:52:50.840446 systemd[1]: Started user@500.service. May 8 00:52:50.841465 systemd[1]: Started session-1.scope. May 8 00:52:50.894673 systemd[1]: Started sshd@1-10.0.0.136:22-10.0.0.1:50244.service. May 8 00:52:50.932347 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 50244 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:50.933528 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:50.937559 systemd-logind[1206]: New session 2 of user core. May 8 00:52:50.938397 systemd[1]: Started session-2.scope. May 8 00:52:50.992306 sshd[1296]: pam_unix(sshd:session): session closed for user core May 8 00:52:50.996720 systemd[1]: sshd@1-10.0.0.136:22-10.0.0.1:50244.service: Deactivated successfully. May 8 00:52:50.997381 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:52:50.997925 systemd-logind[1206]: Session 2 logged out. Waiting for processes to exit. May 8 00:52:50.999030 systemd[1]: Started sshd@2-10.0.0.136:22-10.0.0.1:50260.service. May 8 00:52:50.999594 systemd-logind[1206]: Removed session 2. May 8 00:52:51.035520 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 50260 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:51.036712 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:51.039921 systemd-logind[1206]: New session 3 of user core. May 8 00:52:51.040753 systemd[1]: Started session-3.scope. May 8 00:52:51.090374 sshd[1302]: pam_unix(sshd:session): session closed for user core May 8 00:52:51.093179 systemd[1]: sshd@2-10.0.0.136:22-10.0.0.1:50260.service: Deactivated successfully. May 8 00:52:51.093738 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:52:51.094258 systemd-logind[1206]: Session 3 logged out. Waiting for processes to exit. May 8 00:52:51.095281 systemd[1]: Started sshd@3-10.0.0.136:22-10.0.0.1:50262.service. May 8 00:52:51.095991 systemd-logind[1206]: Removed session 3. May 8 00:52:51.131603 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 50262 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:51.132803 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:51.136163 systemd-logind[1206]: New session 4 of user core. May 8 00:52:51.137067 systemd[1]: Started session-4.scope. May 8 00:52:51.190880 sshd[1308]: pam_unix(sshd:session): session closed for user core May 8 00:52:51.195020 systemd[1]: sshd@3-10.0.0.136:22-10.0.0.1:50262.service: Deactivated successfully. May 8 00:52:51.195661 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:52:51.196265 systemd-logind[1206]: Session 4 logged out. Waiting for processes to exit. May 8 00:52:51.198008 systemd[1]: Started sshd@4-10.0.0.136:22-10.0.0.1:50276.service. May 8 00:52:51.198793 systemd-logind[1206]: Removed session 4. May 8 00:52:51.234278 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 50276 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:51.235806 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:51.239055 systemd-logind[1206]: New session 5 of user core. May 8 00:52:51.240466 systemd[1]: Started session-5.scope. May 8 00:52:51.303280 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:52:51.303530 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:51.320289 dbus-daemon[1193]: avc: received setenforce notice (enforcing=1) May 8 00:52:51.322191 sudo[1317]: pam_unix(sudo:session): session closed for user root May 8 00:52:51.324318 sshd[1314]: pam_unix(sshd:session): session closed for user core May 8 00:52:51.329936 systemd[1]: sshd@4-10.0.0.136:22-10.0.0.1:50276.service: Deactivated successfully. May 8 00:52:51.330482 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:52:51.332151 systemd[1]: Started sshd@5-10.0.0.136:22-10.0.0.1:50290.service. May 8 00:52:51.332421 systemd-logind[1206]: Session 5 logged out. Waiting for processes to exit. May 8 00:52:51.333290 systemd-logind[1206]: Removed session 5. May 8 00:52:51.371184 sshd[1321]: Accepted publickey for core from 10.0.0.1 port 50290 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:51.372553 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:51.376584 systemd-logind[1206]: New session 6 of user core. May 8 00:52:51.377063 systemd[1]: Started session-6.scope. May 8 00:52:51.432465 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:52:51.432677 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:51.435164 sudo[1325]: pam_unix(sudo:session): session closed for user root May 8 00:52:51.439320 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:52:51.439542 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:51.447468 systemd[1]: Stopping audit-rules.service... May 8 00:52:51.447000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:51.449114 auditctl[1328]: No rules May 8 00:52:51.449278 kernel: kauditd_printk_skb: 104 callbacks suppressed May 8 00:52:51.449303 kernel: audit: type=1305 audit(1746665571.447:193): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:52:51.447000 audit[1328]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff57279f0 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.449566 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:52:51.449736 systemd[1]: Stopped audit-rules.service. May 8 00:52:51.452311 systemd[1]: Starting audit-rules.service... May 8 00:52:51.454635 kernel: audit: type=1300 audit(1746665571.447:193): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff57279f0 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.454702 kernel: audit: type=1327 audit(1746665571.447:193): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:51.447000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:52:51.455640 kernel: audit: type=1131 audit(1746665571.449:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.469806 augenrules[1345]: No rules May 8 00:52:51.470632 systemd[1]: Finished audit-rules.service. May 8 00:52:51.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.473613 sudo[1324]: pam_unix(sudo:session): session closed for user root May 8 00:52:51.473868 kernel: audit: type=1130 audit(1746665571.469:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.472000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.475095 sshd[1321]: pam_unix(sshd:session): session closed for user core May 8 00:52:51.472000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.478595 systemd[1]: sshd@5-10.0.0.136:22-10.0.0.1:50290.service: Deactivated successfully. May 8 00:52:51.479199 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:52:51.479736 systemd-logind[1206]: Session 6 logged out. Waiting for processes to exit. May 8 00:52:51.480492 kernel: audit: type=1106 audit(1746665571.472:196): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.480531 kernel: audit: type=1104 audit(1746665571.472:197): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.480547 kernel: audit: type=1106 audit(1746665571.473:198): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.473000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.480755 systemd[1]: Started sshd@6-10.0.0.136:22-10.0.0.1:50300.service. May 8 00:52:51.481455 systemd-logind[1206]: Removed session 6. May 8 00:52:51.473000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.486787 kernel: audit: type=1104 audit(1746665571.473:199): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.486875 kernel: audit: type=1131 audit(1746665571.476:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.136:22-10.0.0.1:50290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.136:22-10.0.0.1:50290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.517000 audit[1351]: USER_ACCT pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.518362 sshd[1351]: Accepted publickey for core from 10.0.0.1 port 50300 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:51.518000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.518000 audit[1351]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd27a3f60 a2=3 a3=1 items=0 ppid=1 pid=1351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:51.519762 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:51.523465 systemd-logind[1206]: New session 7 of user core. May 8 00:52:51.523889 systemd[1]: Started session-7.scope. May 8 00:52:51.525000 audit[1351]: USER_START pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.526000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:51.574000 audit[1354]: USER_ACCT pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.576315 sudo[1354]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:52:51.574000 audit[1354]: CRED_REFR pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.576538 sudo[1354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:52:51.576000 audit[1354]: USER_START pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:51.634111 systemd[1]: Starting docker.service... May 8 00:52:51.734767 env[1366]: time="2025-05-08T00:52:51.734698031Z" level=info msg="Starting up" May 8 00:52:51.736423 env[1366]: time="2025-05-08T00:52:51.736381130Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:52:51.736423 env[1366]: time="2025-05-08T00:52:51.736404025Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:52:51.736522 env[1366]: time="2025-05-08T00:52:51.736426062Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:52:51.736522 env[1366]: time="2025-05-08T00:52:51.736436529Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:52:51.738755 env[1366]: time="2025-05-08T00:52:51.738731057Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:52:51.738755 env[1366]: time="2025-05-08T00:52:51.738751909Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:52:51.738914 env[1366]: time="2025-05-08T00:52:51.738767567Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:52:51.738914 env[1366]: time="2025-05-08T00:52:51.738777543Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:52:51.821939 env[1366]: time="2025-05-08T00:52:51.821903413Z" level=info msg="Loading containers: start." May 8 00:52:51.871000 audit[1400]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.871000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc4b2c560 a2=0 a3=1 items=0 ppid=1366 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:52:51.873000 audit[1402]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.873000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc07d9c60 a2=0 a3=1 items=0 ppid=1366 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:52:51.875000 audit[1404]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.875000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe55606a0 a2=0 a3=1 items=0 ppid=1366 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:52:51.876000 audit[1406]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.876000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe8801e30 a2=0 a3=1 items=0 ppid=1366 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:52:51.879000 audit[1408]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.879000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffafaf750 a2=0 a3=1 items=0 ppid=1366 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:52:51.904000 audit[1413]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.904000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf5ff8d0 a2=0 a3=1 items=0 ppid=1366 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:52:51.910000 audit[1415]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.910000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffc395000 a2=0 a3=1 items=0 ppid=1366 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.910000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:52:51.912000 audit[1417]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.912000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff5e61850 a2=0 a3=1 items=0 ppid=1366 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:52:51.914000 audit[1419]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.914000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffedf50a40 a2=0 a3=1 items=0 ppid=1366 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:51.920000 audit[1423]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.920000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc1d7b7f0 a2=0 a3=1 items=0 ppid=1366 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:51.941000 audit[1424]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.941000 audit[1424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffcef3a8b0 a2=0 a3=1 items=0 ppid=1366 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:51.950851 kernel: Initializing XFRM netlink socket May 8 00:52:51.974282 env[1366]: time="2025-05-08T00:52:51.974230164Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:52:51.989000 audit[1432]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:51.989000 audit[1432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff5a94560 a2=0 a3=1 items=0 ppid=1366 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:52:52.004000 audit[1435]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.004000 audit[1435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffffc78be20 a2=0 a3=1 items=0 ppid=1366 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:52:52.007000 audit[1438]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.007000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd6cba700 a2=0 a3=1 items=0 ppid=1366 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:52:52.009000 audit[1440]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.009000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffea595ad0 a2=0 a3=1 items=0 ppid=1366 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:52:52.011000 audit[1442]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.011000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd431b840 a2=0 a3=1 items=0 ppid=1366 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:52:52.013000 audit[1444]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.013000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffdb014d00 a2=0 a3=1 items=0 ppid=1366 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:52:52.015000 audit[1446]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.015000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffed5199b0 a2=0 a3=1 items=0 ppid=1366 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:52:52.024000 audit[1449]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.024000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff66af2d0 a2=0 a3=1 items=0 ppid=1366 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:52:52.026000 audit[1451]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.026000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd1b319e0 a2=0 a3=1 items=0 ppid=1366 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:52:52.028000 audit[1453]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.028000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc9a171d0 a2=0 a3=1 items=0 ppid=1366 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:52:52.030000 audit[1455]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.030000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd4b3a90 a2=0 a3=1 items=0 ppid=1366 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.030000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:52:52.031271 systemd-networkd[1044]: docker0: Link UP May 8 00:52:52.037000 audit[1459]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.037000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd0011090 a2=0 a3=1 items=0 ppid=1366 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:52.044000 audit[1460]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:52.044000 audit[1460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffee30f150 a2=0 a3=1 items=0 ppid=1366 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.044000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:52:52.047102 env[1366]: time="2025-05-08T00:52:52.047063925Z" level=info msg="Loading containers: done." May 8 00:52:52.071339 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2686266388-merged.mount: Deactivated successfully. May 8 00:52:52.080687 env[1366]: time="2025-05-08T00:52:52.080639256Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:52:52.080876 env[1366]: time="2025-05-08T00:52:52.080835053Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:52:52.080987 env[1366]: time="2025-05-08T00:52:52.080957294Z" level=info msg="Daemon has completed initialization" May 8 00:52:52.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:52.093484 systemd[1]: Started docker.service. May 8 00:52:52.100265 env[1366]: time="2025-05-08T00:52:52.100222189Z" level=info msg="API listen on /run/docker.sock" May 8 00:52:52.782788 env[1219]: time="2025-05-08T00:52:52.782732758Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 8 00:52:53.665938 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3630085810.mount: Deactivated successfully. May 8 00:52:55.248683 env[1219]: time="2025-05-08T00:52:55.248634692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:55.250017 env[1219]: time="2025-05-08T00:52:55.249987689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:55.251905 env[1219]: time="2025-05-08T00:52:55.251878082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:55.254180 env[1219]: time="2025-05-08T00:52:55.254152511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:55.254922 env[1219]: time="2025-05-08T00:52:55.254898053Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3\"" May 8 00:52:55.255536 env[1219]: time="2025-05-08T00:52:55.255492906Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 8 00:52:56.893143 env[1219]: time="2025-05-08T00:52:56.893097358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:56.894796 env[1219]: time="2025-05-08T00:52:56.894760250Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:56.896442 env[1219]: time="2025-05-08T00:52:56.896415092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:56.898182 env[1219]: time="2025-05-08T00:52:56.898155331Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:56.899789 env[1219]: time="2025-05-08T00:52:56.899756450Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a\"" May 8 00:52:56.900241 env[1219]: time="2025-05-08T00:52:56.900216288Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 8 00:52:57.248828 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:52:57.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.249019 systemd[1]: Stopped kubelet.service. May 8 00:52:57.250075 kernel: kauditd_printk_skb: 84 callbacks suppressed May 8 00:52:57.250179 kernel: audit: type=1130 audit(1746665577.248:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.250501 systemd[1]: Starting kubelet.service... May 8 00:52:57.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.255166 kernel: audit: type=1131 audit(1746665577.248:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.334580 systemd[1]: Started kubelet.service. May 8 00:52:57.337868 kernel: audit: type=1130 audit(1746665577.333:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.372991 kubelet[1500]: E0508 00:52:57.372949 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:52:57.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:52:57.375518 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:52:57.375640 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:52:57.378866 kernel: audit: type=1131 audit(1746665577.375:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:52:58.550072 env[1219]: time="2025-05-08T00:52:58.550026500Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:58.552470 env[1219]: time="2025-05-08T00:52:58.552442584Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:58.554769 env[1219]: time="2025-05-08T00:52:58.554728829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:58.556900 env[1219]: time="2025-05-08T00:52:58.556868734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:58.557577 env[1219]: time="2025-05-08T00:52:58.557542535Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d\"" May 8 00:52:58.558737 env[1219]: time="2025-05-08T00:52:58.558707244Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 8 00:52:59.608160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1154653798.mount: Deactivated successfully. May 8 00:53:00.064037 env[1219]: time="2025-05-08T00:53:00.063959530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:00.065835 env[1219]: time="2025-05-08T00:53:00.065794411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:00.067581 env[1219]: time="2025-05-08T00:53:00.067547189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:00.068866 env[1219]: time="2025-05-08T00:53:00.068822332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:00.069222 env[1219]: time="2025-05-08T00:53:00.069189356Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581\"" May 8 00:53:00.069636 env[1219]: time="2025-05-08T00:53:00.069603894Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 8 00:53:00.630585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3185044683.mount: Deactivated successfully. May 8 00:53:01.614161 env[1219]: time="2025-05-08T00:53:01.614097135Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:01.615675 env[1219]: time="2025-05-08T00:53:01.615634186Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:01.617851 env[1219]: time="2025-05-08T00:53:01.617808202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:01.619643 env[1219]: time="2025-05-08T00:53:01.619607531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:01.620408 env[1219]: time="2025-05-08T00:53:01.620368573Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 8 00:53:01.620916 env[1219]: time="2025-05-08T00:53:01.620877598Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 8 00:53:02.124979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2937708372.mount: Deactivated successfully. May 8 00:53:02.131874 env[1219]: time="2025-05-08T00:53:02.131814162Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:02.133264 env[1219]: time="2025-05-08T00:53:02.133227762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:02.135114 env[1219]: time="2025-05-08T00:53:02.135085411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:02.136693 env[1219]: time="2025-05-08T00:53:02.136658339Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:02.137255 env[1219]: time="2025-05-08T00:53:02.137223642Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 8 00:53:02.137800 env[1219]: time="2025-05-08T00:53:02.137761044Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 8 00:53:02.686191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970680723.mount: Deactivated successfully. May 8 00:53:05.638656 env[1219]: time="2025-05-08T00:53:05.638598848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:05.640121 env[1219]: time="2025-05-08T00:53:05.640082572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:05.642255 env[1219]: time="2025-05-08T00:53:05.642225455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:05.644400 env[1219]: time="2025-05-08T00:53:05.644367777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:05.645253 env[1219]: time="2025-05-08T00:53:05.645220475Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 8 00:53:07.498869 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:53:07.499043 systemd[1]: Stopped kubelet.service. May 8 00:53:07.500435 systemd[1]: Starting kubelet.service... May 8 00:53:07.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.507939 kernel: audit: type=1130 audit(1746665587.498:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.508012 kernel: audit: type=1131 audit(1746665587.498:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.633899 systemd[1]: Started kubelet.service. May 8 00:53:07.636846 kernel: audit: type=1130 audit(1746665587.633:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:07.669779 kubelet[1534]: E0508 00:53:07.669707 1534 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:53:07.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:07.671769 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:53:07.671910 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:53:07.674869 kernel: audit: type=1131 audit(1746665587.671:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:53:11.119567 systemd[1]: Stopped kubelet.service. May 8 00:53:11.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.122030 systemd[1]: Starting kubelet.service... May 8 00:53:11.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.125280 kernel: audit: type=1130 audit(1746665591.119:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.125342 kernel: audit: type=1131 audit(1746665591.119:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.148373 systemd[1]: Reloading. May 8 00:53:11.209370 /usr/lib/systemd/system-generators/torcx-generator[1570]: time="2025-05-08T00:53:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:53:11.209401 /usr/lib/systemd/system-generators/torcx-generator[1570]: time="2025-05-08T00:53:11Z" level=info msg="torcx already run" May 8 00:53:11.290553 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:53:11.290572 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:53:11.306090 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:53:11.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.358543 kernel: audit: type=1400 audit(1746665591.353:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.358606 kernel: audit: type=1400 audit(1746665591.353:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.358653 kernel: audit: type=1400 audit(1746665591.353:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363126 kernel: audit: type=1400 audit(1746665591.353:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit: BPF prog-id=40 op=LOAD May 8 00:53:11.355000 audit: BPF prog-id=24 op=UNLOAD May 8 00:53:11.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit: BPF prog-id=41 op=LOAD May 8 00:53:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.359000 audit: BPF prog-id=42 op=LOAD May 8 00:53:11.359000 audit: BPF prog-id=25 op=UNLOAD May 8 00:53:11.359000 audit: BPF prog-id=26 op=UNLOAD May 8 00:53:11.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.362000 audit: BPF prog-id=43 op=LOAD May 8 00:53:11.362000 audit: BPF prog-id=38 op=UNLOAD May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit: BPF prog-id=44 op=LOAD May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.363000 audit: BPF prog-id=45 op=LOAD May 8 00:53:11.363000 audit: BPF prog-id=27 op=UNLOAD May 8 00:53:11.363000 audit: BPF prog-id=28 op=UNLOAD May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit: BPF prog-id=46 op=LOAD May 8 00:53:11.364000 audit: BPF prog-id=35 op=UNLOAD May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit: BPF prog-id=47 op=LOAD May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.364000 audit: BPF prog-id=48 op=LOAD May 8 00:53:11.364000 audit: BPF prog-id=36 op=UNLOAD May 8 00:53:11.364000 audit: BPF prog-id=37 op=UNLOAD May 8 00:53:11.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.366000 audit: BPF prog-id=49 op=LOAD May 8 00:53:11.366000 audit: BPF prog-id=29 op=UNLOAD May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit: BPF prog-id=50 op=LOAD May 8 00:53:11.367000 audit: BPF prog-id=34 op=UNLOAD May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit: BPF prog-id=51 op=LOAD May 8 00:53:11.368000 audit: BPF prog-id=30 op=UNLOAD May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit: BPF prog-id=52 op=LOAD May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.368000 audit: BPF prog-id=53 op=LOAD May 8 00:53:11.368000 audit: BPF prog-id=31 op=UNLOAD May 8 00:53:11.368000 audit: BPF prog-id=32 op=UNLOAD May 8 00:53:11.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:11.369000 audit: BPF prog-id=54 op=LOAD May 8 00:53:11.369000 audit: BPF prog-id=33 op=UNLOAD May 8 00:53:11.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.378400 systemd[1]: Started kubelet.service. May 8 00:53:11.382075 systemd[1]: Stopping kubelet.service... May 8 00:53:11.382717 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:53:11.382933 systemd[1]: Stopped kubelet.service. May 8 00:53:11.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.384283 systemd[1]: Starting kubelet.service... May 8 00:53:11.464291 systemd[1]: Started kubelet.service. May 8 00:53:11.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:11.530814 kubelet[1619]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:11.530814 kubelet[1619]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:53:11.530814 kubelet[1619]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:11.531146 kubelet[1619]: I0508 00:53:11.530977 1619 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:53:12.229879 kubelet[1619]: I0508 00:53:12.229816 1619 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 8 00:53:12.229879 kubelet[1619]: I0508 00:53:12.229867 1619 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:53:12.230125 kubelet[1619]: I0508 00:53:12.230098 1619 server.go:929] "Client rotation is on, will bootstrap in background" May 8 00:53:12.261040 kubelet[1619]: E0508 00:53:12.261004 1619 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.136:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:12.261750 kubelet[1619]: I0508 00:53:12.261726 1619 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:53:12.267178 kubelet[1619]: E0508 00:53:12.267152 1619 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:53:12.267178 kubelet[1619]: I0508 00:53:12.267178 1619 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:53:12.270579 kubelet[1619]: I0508 00:53:12.270562 1619 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:53:12.271399 kubelet[1619]: I0508 00:53:12.271374 1619 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 8 00:53:12.271531 kubelet[1619]: I0508 00:53:12.271499 1619 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:53:12.271705 kubelet[1619]: I0508 00:53:12.271532 1619 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:53:12.271853 kubelet[1619]: I0508 00:53:12.271830 1619 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:53:12.271853 kubelet[1619]: I0508 00:53:12.271854 1619 container_manager_linux.go:300] "Creating device plugin manager" May 8 00:53:12.272027 kubelet[1619]: I0508 00:53:12.272015 1619 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:12.278032 kubelet[1619]: W0508 00:53:12.277975 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:12.278178 kubelet[1619]: E0508 00:53:12.278146 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:12.278252 kubelet[1619]: I0508 00:53:12.278239 1619 kubelet.go:408] "Attempting to sync node with API server" May 8 00:53:12.278319 kubelet[1619]: I0508 00:53:12.278308 1619 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:53:12.278407 kubelet[1619]: I0508 00:53:12.278390 1619 kubelet.go:314] "Adding apiserver pod source" May 8 00:53:12.278471 kubelet[1619]: I0508 00:53:12.278459 1619 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:53:12.279340 kubelet[1619]: W0508 00:53:12.279287 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:12.279411 kubelet[1619]: E0508 00:53:12.279346 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:12.280543 kubelet[1619]: I0508 00:53:12.280514 1619 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:53:12.284512 kubelet[1619]: I0508 00:53:12.284487 1619 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:53:12.285396 kubelet[1619]: W0508 00:53:12.285376 1619 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:53:12.286278 kubelet[1619]: I0508 00:53:12.286256 1619 server.go:1269] "Started kubelet" May 8 00:53:12.286753 kubelet[1619]: I0508 00:53:12.286703 1619 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:53:12.287197 kubelet[1619]: I0508 00:53:12.287150 1619 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:53:12.287411 kubelet[1619]: I0508 00:53:12.287382 1619 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:53:12.287964 kubelet[1619]: I0508 00:53:12.287943 1619 server.go:460] "Adding debug handlers to kubelet server" May 8 00:53:12.287000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:12.287000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:12.287000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007ec3f0 a1=40006d2708 a2=40007ec3c0 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.287000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:12.288000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:12.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:12.288000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005cf3e0 a1=40006d2720 a2=40007ec480 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:12.289170 kubelet[1619]: I0508 00:53:12.288829 1619 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:53:12.289170 kubelet[1619]: I0508 00:53:12.288887 1619 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:53:12.289170 kubelet[1619]: I0508 00:53:12.288947 1619 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:53:12.289562 kubelet[1619]: I0508 00:53:12.289521 1619 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:53:12.291176 kubelet[1619]: E0508 00:53:12.291154 1619 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:53:12.290000 audit[1631]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.290000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd3e54030 a2=0 a3=1 items=0 ppid=1619 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:53:12.291417 kubelet[1619]: E0508 00:53:12.291397 1619 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:12.291502 kubelet[1619]: I0508 00:53:12.291492 1619 volume_manager.go:289] "Starting Kubelet Volume Manager" May 8 00:53:12.291701 kubelet[1619]: I0508 00:53:12.291681 1619 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 8 00:53:12.291756 kubelet[1619]: I0508 00:53:12.291742 1619 reconciler.go:26] "Reconciler: start to sync state" May 8 00:53:12.291956 kubelet[1619]: E0508 00:53:12.291882 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="200ms" May 8 00:53:12.291000 audit[1632]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.291000 audit[1632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc703650 a2=0 a3=1 items=0 ppid=1619 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:53:12.292131 kubelet[1619]: I0508 00:53:12.292114 1619 factory.go:221] Registration of the systemd container factory successfully May 8 00:53:12.292207 kubelet[1619]: I0508 00:53:12.292181 1619 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:53:12.292251 kubelet[1619]: W0508 00:53:12.292205 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:12.292310 kubelet[1619]: E0508 00:53:12.292280 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:12.292468 kubelet[1619]: E0508 00:53:12.290627 1619 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.136:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.136:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d671a199e38e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:53:12.286230756 +0000 UTC m=+0.817776771,LastTimestamp:2025-05-08 00:53:12.286230756 +0000 UTC m=+0.817776771,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:53:12.293756 kubelet[1619]: I0508 00:53:12.293727 1619 factory.go:221] Registration of the containerd container factory successfully May 8 00:53:12.293000 audit[1634]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.293000 audit[1634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffe431bd0 a2=0 a3=1 items=0 ppid=1619 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:12.295000 audit[1636]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.295000 audit[1636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe17bf060 a2=0 a3=1 items=0 ppid=1619 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:12.300000 audit[1639]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.300000 audit[1639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe9fd3370 a2=0 a3=1 items=0 ppid=1619 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:53:12.301821 kubelet[1619]: I0508 00:53:12.301793 1619 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:53:12.301000 audit[1640]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:12.301000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffddf5d580 a2=0 a3=1 items=0 ppid=1619 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:53:12.302927 kubelet[1619]: I0508 00:53:12.302898 1619 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:53:12.302927 kubelet[1619]: I0508 00:53:12.302923 1619 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:53:12.302995 kubelet[1619]: I0508 00:53:12.302942 1619 kubelet.go:2321] "Starting kubelet main sync loop" May 8 00:53:12.302995 kubelet[1619]: E0508 00:53:12.302976 1619 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:53:12.302000 audit[1643]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.302000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9705440 a2=0 a3=1 items=0 ppid=1619 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:53:12.303000 audit[1645]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.303000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3db1d90 a2=0 a3=1 items=0 ppid=1619 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:53:12.304000 audit[1646]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:12.304000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6de9420 a2=0 a3=1 items=0 ppid=1619 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:53:12.305000 audit[1647]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:12.305000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc32b3db0 a2=0 a3=1 items=0 ppid=1619 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:53:12.306679 kubelet[1619]: W0508 00:53:12.306632 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:12.306679 kubelet[1619]: E0508 00:53:12.306676 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:12.306000 audit[1648]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:12.306000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcf313900 a2=0 a3=1 items=0 ppid=1619 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:53:12.307546 kubelet[1619]: I0508 00:53:12.307523 1619 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:53:12.307546 kubelet[1619]: I0508 00:53:12.307542 1619 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:53:12.307639 kubelet[1619]: I0508 00:53:12.307567 1619 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:12.307000 audit[1649]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:12.307000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdea4c9d0 a2=0 a3=1 items=0 ppid=1619 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:53:12.370107 kubelet[1619]: I0508 00:53:12.370073 1619 policy_none.go:49] "None policy: Start" May 8 00:53:12.370752 kubelet[1619]: I0508 00:53:12.370726 1619 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:53:12.370811 kubelet[1619]: I0508 00:53:12.370759 1619 state_mem.go:35] "Initializing new in-memory state store" May 8 00:53:12.376823 systemd[1]: Created slice kubepods.slice. May 8 00:53:12.380539 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:53:12.382767 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:53:12.391795 kubelet[1619]: E0508 00:53:12.391767 1619 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:12.396640 kubelet[1619]: I0508 00:53:12.396616 1619 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:53:12.395000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:12.395000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:12.395000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a24d80 a1=40006d3aa0 a2=4000a24c00 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.395000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:12.396852 kubelet[1619]: I0508 00:53:12.396683 1619 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:53:12.396852 kubelet[1619]: I0508 00:53:12.396778 1619 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:53:12.396852 kubelet[1619]: I0508 00:53:12.396790 1619 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:53:12.397327 kubelet[1619]: I0508 00:53:12.397244 1619 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:53:12.398167 kubelet[1619]: E0508 00:53:12.398146 1619 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:53:12.409646 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 8 00:53:12.422692 systemd[1]: Created slice kubepods-burstable-pod830f7b09b55b55417c357f5b146c95f3.slice. May 8 00:53:12.426194 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 8 00:53:12.493231 kubelet[1619]: E0508 00:53:12.493111 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="400ms" May 8 00:53:12.498255 kubelet[1619]: I0508 00:53:12.498232 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:12.498709 kubelet[1619]: E0508 00:53:12.498679 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 8 00:53:12.593311 kubelet[1619]: I0508 00:53:12.593272 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:12.593749 kubelet[1619]: I0508 00:53:12.593709 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:12.593882 kubelet[1619]: I0508 00:53:12.593861 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:12.594015 kubelet[1619]: I0508 00:53:12.593990 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:12.594112 kubelet[1619]: I0508 00:53:12.594097 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:12.594199 kubelet[1619]: I0508 00:53:12.594184 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:12.594297 kubelet[1619]: I0508 00:53:12.594283 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:12.594384 kubelet[1619]: I0508 00:53:12.594370 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 8 00:53:12.594485 kubelet[1619]: I0508 00:53:12.594470 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:12.700302 kubelet[1619]: I0508 00:53:12.700276 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:12.700649 kubelet[1619]: E0508 00:53:12.700613 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 8 00:53:12.721904 kubelet[1619]: E0508 00:53:12.721884 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:12.722530 env[1219]: time="2025-05-08T00:53:12.722495353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 8 00:53:12.725222 kubelet[1619]: E0508 00:53:12.725194 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:12.725707 env[1219]: time="2025-05-08T00:53:12.725660947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:830f7b09b55b55417c357f5b146c95f3,Namespace:kube-system,Attempt:0,}" May 8 00:53:12.728372 kubelet[1619]: E0508 00:53:12.728349 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:12.728872 env[1219]: time="2025-05-08T00:53:12.728655472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 8 00:53:12.893613 kubelet[1619]: E0508 00:53:12.893556 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="800ms" May 8 00:53:13.102771 kubelet[1619]: I0508 00:53:13.102373 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:13.102771 kubelet[1619]: E0508 00:53:13.102741 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" May 8 00:53:13.123813 kubelet[1619]: W0508 00:53:13.123684 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:13.123813 kubelet[1619]: E0508 00:53:13.123771 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:13.243092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount578111463.mount: Deactivated successfully. May 8 00:53:13.248559 env[1219]: time="2025-05-08T00:53:13.248515002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.250392 env[1219]: time="2025-05-08T00:53:13.250361763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.251667 env[1219]: time="2025-05-08T00:53:13.251640020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.253119 env[1219]: time="2025-05-08T00:53:13.253091358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.254862 env[1219]: time="2025-05-08T00:53:13.254817659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.257429 env[1219]: time="2025-05-08T00:53:13.257393434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.258196 env[1219]: time="2025-05-08T00:53:13.258158770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.261244 env[1219]: time="2025-05-08T00:53:13.261212064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.263242 env[1219]: time="2025-05-08T00:53:13.263214087Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.264013 env[1219]: time="2025-05-08T00:53:13.263987152Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.264812 env[1219]: time="2025-05-08T00:53:13.264780721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.265507 env[1219]: time="2025-05-08T00:53:13.265475254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:13.290867 kubelet[1619]: W0508 00:53:13.285860 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:13.290867 kubelet[1619]: E0508 00:53:13.285921 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:13.295242 env[1219]: time="2025-05-08T00:53:13.295163205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:13.295328 env[1219]: time="2025-05-08T00:53:13.295251909Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:13.295374 env[1219]: time="2025-05-08T00:53:13.295279862Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:13.295648 env[1219]: time="2025-05-08T00:53:13.295598595Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/319470a606aec7985f3a376c000e6001dea3aa66580610aa3229363356d1c676 pid=1670 runtime=io.containerd.runc.v2 May 8 00:53:13.295828 env[1219]: time="2025-05-08T00:53:13.295727666Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:13.295828 env[1219]: time="2025-05-08T00:53:13.295816850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:13.295922 env[1219]: time="2025-05-08T00:53:13.295828944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:13.296102 env[1219]: time="2025-05-08T00:53:13.296051285Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:13.296169 env[1219]: time="2025-05-08T00:53:13.296116721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08bc91a360e789e155a2f5c0448b63ad491136a6901651f259ab25de87679df5 pid=1674 runtime=io.containerd.runc.v2 May 8 00:53:13.296262 env[1219]: time="2025-05-08T00:53:13.296231776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:13.296357 env[1219]: time="2025-05-08T00:53:13.296319438Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:13.297286 env[1219]: time="2025-05-08T00:53:13.296518391Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e954904348a5fea29026cc2d88274ae5403711aa6e9ebcf15a87f3af96a0370 pid=1671 runtime=io.containerd.runc.v2 May 8 00:53:13.308035 systemd[1]: Started cri-containerd-08bc91a360e789e155a2f5c0448b63ad491136a6901651f259ab25de87679df5.scope. May 8 00:53:13.315710 systemd[1]: Started cri-containerd-319470a606aec7985f3a376c000e6001dea3aa66580610aa3229363356d1c676.scope. May 8 00:53:13.324620 systemd[1]: Started cri-containerd-7e954904348a5fea29026cc2d88274ae5403711aa6e9ebcf15a87f3af96a0370.scope. May 8 00:53:13.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.351380 kernel: kauditd_printk_skb: 219 callbacks suppressed May 8 00:53:13.351432 kernel: audit: type=1400 audit(1746665593.349:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355965 kernel: audit: type=1400 audit(1746665593.349:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358470 kernel: audit: type=1400 audit(1746665593.349:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358534 kernel: audit: type=1400 audit(1746665593.349:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.360778 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:53:13.360889 kernel: audit: type=1400 audit(1746665593.349:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.361451 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:53:13.361505 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:53:13.361524 kernel: audit: backlog limit exceeded May 8 00:53:13.361538 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:53:13.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.350000 audit: BPF prog-id=55 op=LOAD May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626339316133363065373839653135356132663563303434386236 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626339316133363065373839653135356132663563303434386236 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.354000 audit: BPF prog-id=56 op=LOAD May 8 00:53:13.354000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626339316133363065373839653135356132663563303434386236 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.357000 audit: BPF prog-id=58 op=LOAD May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1670 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393437306136303661656337393835663361333736633030306536 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1670 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393437306136303661656337393835663361333736633030306536 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.355000 audit: BPF prog-id=57 op=LOAD May 8 00:53:13.355000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626339316133363065373839653135356132663563303434386236 May 8 00:53:13.363000 audit: BPF prog-id=57 op=UNLOAD May 8 00:53:13.363000 audit: BPF prog-id=56 op=UNLOAD May 8 00:53:13.363000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.358000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1670 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393437306136303661656337393835663361333736633030306536 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.363000 audit: BPF prog-id=60 op=LOAD May 8 00:53:13.363000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626339316133363065373839653135356132663563303434386236 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit: BPF prog-id=61 op=LOAD May 8 00:53:13.364000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1670 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393437306136303661656337393835663361333736633030306536 May 8 00:53:13.364000 audit: BPF prog-id=61 op=UNLOAD May 8 00:53:13.364000 audit: BPF prog-id=59 op=UNLOAD May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.364000 audit: BPF prog-id=62 op=LOAD May 8 00:53:13.364000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1670 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393437306136303661656337393835663361333736633030306536 May 8 00:53:13.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.365000 audit: BPF prog-id=63 op=LOAD May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1671 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765393534393034333438613566656132393032366363326438383237 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1671 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765393534393034333438613566656132393032366363326438383237 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit: BPF prog-id=64 op=LOAD May 8 00:53:13.371000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1671 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765393534393034333438613566656132393032366363326438383237 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit: BPF prog-id=65 op=LOAD May 8 00:53:13.371000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1671 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765393534393034333438613566656132393032366363326438383237 May 8 00:53:13.371000 audit: BPF prog-id=65 op=UNLOAD May 8 00:53:13.371000 audit: BPF prog-id=64 op=UNLOAD May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.371000 audit: BPF prog-id=66 op=LOAD May 8 00:53:13.371000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1671 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765393534393034333438613566656132393032366363326438383237 May 8 00:53:13.388356 env[1219]: time="2025-05-08T00:53:13.388314522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:830f7b09b55b55417c357f5b146c95f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"08bc91a360e789e155a2f5c0448b63ad491136a6901651f259ab25de87679df5\"" May 8 00:53:13.389775 kubelet[1619]: E0508 00:53:13.389541 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:13.392106 env[1219]: time="2025-05-08T00:53:13.392066874Z" level=info msg="CreateContainer within sandbox \"08bc91a360e789e155a2f5c0448b63ad491136a6901651f259ab25de87679df5\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:53:13.396637 env[1219]: time="2025-05-08T00:53:13.396605667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"319470a606aec7985f3a376c000e6001dea3aa66580610aa3229363356d1c676\"" May 8 00:53:13.398931 kubelet[1619]: E0508 00:53:13.398753 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:13.400783 env[1219]: time="2025-05-08T00:53:13.400756165Z" level=info msg="CreateContainer within sandbox \"319470a606aec7985f3a376c000e6001dea3aa66580610aa3229363356d1c676\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:53:13.408655 env[1219]: time="2025-05-08T00:53:13.408621772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"7e954904348a5fea29026cc2d88274ae5403711aa6e9ebcf15a87f3af96a0370\"" May 8 00:53:13.409463 kubelet[1619]: E0508 00:53:13.409310 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:13.411025 env[1219]: time="2025-05-08T00:53:13.410992707Z" level=info msg="CreateContainer within sandbox \"7e954904348a5fea29026cc2d88274ae5403711aa6e9ebcf15a87f3af96a0370\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:53:13.412713 env[1219]: time="2025-05-08T00:53:13.412677439Z" level=info msg="CreateContainer within sandbox \"08bc91a360e789e155a2f5c0448b63ad491136a6901651f259ab25de87679df5\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"205062a246cb573f5a4031471f4c4703e3fcfc0edb7fe9d638e0bbc493eddc0f\"" May 8 00:53:13.413210 env[1219]: time="2025-05-08T00:53:13.413178266Z" level=info msg="StartContainer for \"205062a246cb573f5a4031471f4c4703e3fcfc0edb7fe9d638e0bbc493eddc0f\"" May 8 00:53:13.417474 env[1219]: time="2025-05-08T00:53:13.417434408Z" level=info msg="CreateContainer within sandbox \"319470a606aec7985f3a376c000e6001dea3aa66580610aa3229363356d1c676\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4d9ea57fa850d1c2e18b5eedac424977188b4dc829d38fa980846ed653c285a3\"" May 8 00:53:13.418406 env[1219]: time="2025-05-08T00:53:13.418366659Z" level=info msg="StartContainer for \"4d9ea57fa850d1c2e18b5eedac424977188b4dc829d38fa980846ed653c285a3\"" May 8 00:53:13.426639 env[1219]: time="2025-05-08T00:53:13.426595811Z" level=info msg="CreateContainer within sandbox \"7e954904348a5fea29026cc2d88274ae5403711aa6e9ebcf15a87f3af96a0370\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"423648fc2aa8f978b1a235cf6a7fdaf45ce332d8f64ef32664e96d5da1d3bb4e\"" May 8 00:53:13.427234 env[1219]: time="2025-05-08T00:53:13.427201801Z" level=info msg="StartContainer for \"423648fc2aa8f978b1a235cf6a7fdaf45ce332d8f64ef32664e96d5da1d3bb4e\"" May 8 00:53:13.432531 systemd[1]: Started cri-containerd-205062a246cb573f5a4031471f4c4703e3fcfc0edb7fe9d638e0bbc493eddc0f.scope. May 8 00:53:13.434867 systemd[1]: Started cri-containerd-4d9ea57fa850d1c2e18b5eedac424977188b4dc829d38fa980846ed653c285a3.scope. May 8 00:53:13.439464 kubelet[1619]: W0508 00:53:13.439352 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:13.439464 kubelet[1619]: E0508 00:53:13.439432 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.136:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:13.458535 systemd[1]: Started cri-containerd-423648fc2aa8f978b1a235cf6a7fdaf45ce332d8f64ef32664e96d5da1d3bb4e.scope. May 8 00:53:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.467000 audit: BPF prog-id=67 op=LOAD May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1674 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353036326132343663623537336635613430333134373166346334 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1674 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353036326132343663623537336635613430333134373166346334 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.468000 audit: BPF prog-id=68 op=LOAD May 8 00:53:13.468000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1674 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353036326132343663623537336635613430333134373166346334 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit: BPF prog-id=69 op=LOAD May 8 00:53:13.469000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1674 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353036326132343663623537336635613430333134373166346334 May 8 00:53:13.469000 audit: BPF prog-id=69 op=UNLOAD May 8 00:53:13.469000 audit: BPF prog-id=68 op=UNLOAD May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.469000 audit: BPF prog-id=70 op=LOAD May 8 00:53:13.469000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1674 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230353036326132343663623537336635613430333134373166346334 May 8 00:53:13.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.474000 audit: BPF prog-id=71 op=LOAD May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1670 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396561353766613835306431633265313862356565646163343234 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1670 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396561353766613835306431633265313862356565646163343234 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.475000 audit: BPF prog-id=72 op=LOAD May 8 00:53:13.475000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1670 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396561353766613835306431633265313862356565646163343234 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit: BPF prog-id=73 op=LOAD May 8 00:53:13.476000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1670 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396561353766613835306431633265313862356565646163343234 May 8 00:53:13.476000 audit: BPF prog-id=73 op=UNLOAD May 8 00:53:13.476000 audit: BPF prog-id=72 op=UNLOAD May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.476000 audit: BPF prog-id=74 op=LOAD May 8 00:53:13.476000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1670 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396561353766613835306431633265313862356565646163343234 May 8 00:53:13.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.481000 audit: BPF prog-id=75 op=LOAD May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1671 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432333634386663326161386639373862316132333563663661376664 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1671 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432333634386663326161386639373862316132333563663661376664 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit: BPF prog-id=76 op=LOAD May 8 00:53:13.482000 audit[1821]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1671 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432333634386663326161386639373862316132333563663661376664 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.482000 audit: BPF prog-id=77 op=LOAD May 8 00:53:13.482000 audit[1821]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1671 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432333634386663326161386639373862316132333563663661376664 May 8 00:53:13.482000 audit: BPF prog-id=77 op=UNLOAD May 8 00:53:13.483000 audit: BPF prog-id=76 op=UNLOAD May 8 00:53:13.483000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:13.483000 audit: BPF prog-id=78 op=LOAD May 8 00:53:13.483000 audit[1821]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1671 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:13.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432333634386663326161386639373862316132333563663661376664 May 8 00:53:13.497710 env[1219]: time="2025-05-08T00:53:13.497619227Z" level=info msg="StartContainer for \"205062a246cb573f5a4031471f4c4703e3fcfc0edb7fe9d638e0bbc493eddc0f\" returns successfully" May 8 00:53:13.503662 kubelet[1619]: W0508 00:53:13.502941 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused May 8 00:53:13.503662 kubelet[1619]: E0508 00:53:13.503008 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.136:6443: connect: connection refused" logger="UnhandledError" May 8 00:53:13.513020 env[1219]: time="2025-05-08T00:53:13.512978886Z" level=info msg="StartContainer for \"423648fc2aa8f978b1a235cf6a7fdaf45ce332d8f64ef32664e96d5da1d3bb4e\" returns successfully" May 8 00:53:13.549297 env[1219]: time="2025-05-08T00:53:13.549255869Z" level=info msg="StartContainer for \"4d9ea57fa850d1c2e18b5eedac424977188b4dc829d38fa980846ed653c285a3\" returns successfully" May 8 00:53:13.694810 kubelet[1619]: E0508 00:53:13.694739 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="1.6s" May 8 00:53:13.904186 kubelet[1619]: I0508 00:53:13.904149 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:14.318423 kubelet[1619]: E0508 00:53:14.318389 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:14.319005 kubelet[1619]: E0508 00:53:14.318972 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:14.320670 kubelet[1619]: E0508 00:53:14.320647 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:14.983000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.983000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006e93e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:14.983000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.983000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.983000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400051d420 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:14.983000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:15.012000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.012000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005174f00 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.012000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.012000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400666c040 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.012000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.012000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400326b650 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.026000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.026000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40068b4090 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.026000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.041000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.041000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4004aa59a0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.041000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.041000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:15.041000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4006ad2cf0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:53:15.041000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:15.240873 kubelet[1619]: I0508 00:53:15.240752 1619 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 8 00:53:15.240873 kubelet[1619]: E0508 00:53:15.240796 1619 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 8 00:53:15.256478 kubelet[1619]: E0508 00:53:15.256408 1619 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:15.281423 kubelet[1619]: I0508 00:53:15.281391 1619 apiserver.go:52] "Watching apiserver" May 8 00:53:15.292135 kubelet[1619]: I0508 00:53:15.292105 1619 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 8 00:53:15.326778 kubelet[1619]: E0508 00:53:15.326745 1619 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 8 00:53:15.326941 kubelet[1619]: E0508 00:53:15.326926 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:15.578290 kubelet[1619]: E0508 00:53:15.578248 1619 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 8 00:53:15.578421 kubelet[1619]: E0508 00:53:15.578413 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:16.327560 kubelet[1619]: E0508 00:53:16.327530 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:16.654874 kubelet[1619]: E0508 00:53:16.654751 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:16.949969 systemd[1]: Reloading. May 8 00:53:16.988487 /usr/lib/systemd/system-generators/torcx-generator[1913]: time="2025-05-08T00:53:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:53:16.988514 /usr/lib/systemd/system-generators/torcx-generator[1913]: time="2025-05-08T00:53:16Z" level=info msg="torcx already run" May 8 00:53:17.047697 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:53:17.047715 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:53:17.063191 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:53:17.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.122000 audit: BPF prog-id=79 op=LOAD May 8 00:53:17.122000 audit: BPF prog-id=40 op=UNLOAD May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit: BPF prog-id=80 op=LOAD May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit: BPF prog-id=81 op=LOAD May 8 00:53:17.123000 audit: BPF prog-id=41 op=UNLOAD May 8 00:53:17.123000 audit: BPF prog-id=42 op=UNLOAD May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.123000 audit: BPF prog-id=82 op=LOAD May 8 00:53:17.124000 audit: BPF prog-id=43 op=UNLOAD May 8 00:53:17.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit: BPF prog-id=83 op=LOAD May 8 00:53:17.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.125000 audit: BPF prog-id=84 op=LOAD May 8 00:53:17.125000 audit: BPF prog-id=44 op=UNLOAD May 8 00:53:17.125000 audit: BPF prog-id=45 op=UNLOAD May 8 00:53:17.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.126000 audit: BPF prog-id=85 op=LOAD May 8 00:53:17.126000 audit: BPF prog-id=55 op=UNLOAD May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit: BPF prog-id=86 op=LOAD May 8 00:53:17.127000 audit: BPF prog-id=46 op=UNLOAD May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit: BPF prog-id=87 op=LOAD May 8 00:53:17.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.128000 audit: BPF prog-id=88 op=LOAD May 8 00:53:17.128000 audit: BPF prog-id=47 op=UNLOAD May 8 00:53:17.128000 audit: BPF prog-id=48 op=UNLOAD May 8 00:53:17.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.129000 audit: BPF prog-id=89 op=LOAD May 8 00:53:17.129000 audit: BPF prog-id=49 op=UNLOAD May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit: BPF prog-id=90 op=LOAD May 8 00:53:17.130000 audit: BPF prog-id=71 op=UNLOAD May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.130000 audit: BPF prog-id=91 op=LOAD May 8 00:53:17.130000 audit: BPF prog-id=67 op=UNLOAD May 8 00:53:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.131000 audit: BPF prog-id=92 op=LOAD May 8 00:53:17.131000 audit: BPF prog-id=50 op=UNLOAD May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit: BPF prog-id=93 op=LOAD May 8 00:53:17.132000 audit: BPF prog-id=51 op=UNLOAD May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit: BPF prog-id=94 op=LOAD May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.132000 audit: BPF prog-id=95 op=LOAD May 8 00:53:17.132000 audit: BPF prog-id=52 op=UNLOAD May 8 00:53:17.132000 audit: BPF prog-id=53 op=UNLOAD May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit: BPF prog-id=96 op=LOAD May 8 00:53:17.133000 audit: BPF prog-id=75 op=UNLOAD May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit: BPF prog-id=97 op=LOAD May 8 00:53:17.134000 audit: BPF prog-id=58 op=UNLOAD May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.134000 audit: BPF prog-id=98 op=LOAD May 8 00:53:17.134000 audit: BPF prog-id=63 op=UNLOAD May 8 00:53:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.135000 audit: BPF prog-id=99 op=LOAD May 8 00:53:17.135000 audit: BPF prog-id=54 op=UNLOAD May 8 00:53:17.146305 kubelet[1619]: I0508 00:53:17.146215 1619 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:53:17.146485 systemd[1]: Stopping kubelet.service... May 8 00:53:17.176208 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:53:17.176390 systemd[1]: Stopped kubelet.service. May 8 00:53:17.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:17.176441 systemd[1]: kubelet.service: Consumed 1.112s CPU time. May 8 00:53:17.178123 systemd[1]: Starting kubelet.service... May 8 00:53:17.259461 systemd[1]: Started kubelet.service. May 8 00:53:17.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:17.296186 kubelet[1955]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:17.296186 kubelet[1955]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:53:17.296186 kubelet[1955]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:53:17.296521 kubelet[1955]: I0508 00:53:17.296232 1955 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:53:17.302245 kubelet[1955]: I0508 00:53:17.302211 1955 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 8 00:53:17.302245 kubelet[1955]: I0508 00:53:17.302239 1955 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:53:17.302470 kubelet[1955]: I0508 00:53:17.302453 1955 server.go:929] "Client rotation is on, will bootstrap in background" May 8 00:53:17.303679 kubelet[1955]: I0508 00:53:17.303657 1955 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:53:17.305582 kubelet[1955]: I0508 00:53:17.305561 1955 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:53:17.308283 kubelet[1955]: E0508 00:53:17.308225 1955 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:53:17.308283 kubelet[1955]: I0508 00:53:17.308265 1955 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:53:17.310485 kubelet[1955]: I0508 00:53:17.310466 1955 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:53:17.310652 kubelet[1955]: I0508 00:53:17.310639 1955 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 8 00:53:17.310895 kubelet[1955]: I0508 00:53:17.310861 1955 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:53:17.311104 kubelet[1955]: I0508 00:53:17.310952 1955 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:53:17.311236 kubelet[1955]: I0508 00:53:17.311222 1955 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:53:17.311293 kubelet[1955]: I0508 00:53:17.311284 1955 container_manager_linux.go:300] "Creating device plugin manager" May 8 00:53:17.311375 kubelet[1955]: I0508 00:53:17.311365 1955 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:17.311538 kubelet[1955]: I0508 00:53:17.311523 1955 kubelet.go:408] "Attempting to sync node with API server" May 8 00:53:17.311618 kubelet[1955]: I0508 00:53:17.311607 1955 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:53:17.311683 kubelet[1955]: I0508 00:53:17.311674 1955 kubelet.go:314] "Adding apiserver pod source" May 8 00:53:17.311757 kubelet[1955]: I0508 00:53:17.311747 1955 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:53:17.312569 kubelet[1955]: I0508 00:53:17.312532 1955 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:53:17.313070 kubelet[1955]: I0508 00:53:17.313054 1955 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:53:17.314481 kubelet[1955]: I0508 00:53:17.314452 1955 server.go:1269] "Started kubelet" May 8 00:53:17.316817 kubelet[1955]: I0508 00:53:17.316790 1955 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:53:17.316905 kubelet[1955]: I0508 00:53:17.316823 1955 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:53:17.316905 kubelet[1955]: I0508 00:53:17.316863 1955 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:53:17.317001 kubelet[1955]: I0508 00:53:17.316979 1955 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:53:17.315000 audit[1955]: AVC avc: denied { mac_admin } for pid=1955 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.315000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:17.315000 audit[1955]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d502d0 a1=4000d025b8 a2=4000d502a0 a3=25 items=0 ppid=1 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:17.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:17.315000 audit[1955]: AVC avc: denied { mac_admin } for pid=1955 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.315000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:17.315000 audit[1955]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400036daa0 a1=4000d025d0 a2=4000d50360 a3=25 items=0 ppid=1 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:17.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:17.318042 kubelet[1955]: I0508 00:53:17.318012 1955 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:53:17.318168 kubelet[1955]: I0508 00:53:17.318114 1955 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:53:17.318339 kubelet[1955]: I0508 00:53:17.318312 1955 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:53:17.318405 kubelet[1955]: I0508 00:53:17.318388 1955 volume_manager.go:289] "Starting Kubelet Volume Manager" May 8 00:53:17.320000 kubelet[1955]: I0508 00:53:17.319975 1955 server.go:460] "Adding debug handlers to kubelet server" May 8 00:53:17.322305 kubelet[1955]: I0508 00:53:17.320151 1955 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 8 00:53:17.323300 kubelet[1955]: I0508 00:53:17.320272 1955 reconciler.go:26] "Reconciler: start to sync state" May 8 00:53:17.323300 kubelet[1955]: E0508 00:53:17.320688 1955 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:53:17.326250 kubelet[1955]: I0508 00:53:17.326221 1955 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:53:17.330324 kubelet[1955]: I0508 00:53:17.330297 1955 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:53:17.330417 kubelet[1955]: I0508 00:53:17.330405 1955 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:53:17.330478 kubelet[1955]: I0508 00:53:17.330469 1955 kubelet.go:2321] "Starting kubelet main sync loop" May 8 00:53:17.330592 kubelet[1955]: E0508 00:53:17.330569 1955 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:53:17.343296 kubelet[1955]: I0508 00:53:17.343265 1955 factory.go:221] Registration of the systemd container factory successfully May 8 00:53:17.343386 kubelet[1955]: I0508 00:53:17.343359 1955 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:53:17.347306 kubelet[1955]: E0508 00:53:17.347284 1955 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:53:17.348289 kubelet[1955]: I0508 00:53:17.348215 1955 factory.go:221] Registration of the containerd container factory successfully May 8 00:53:17.378451 kubelet[1955]: I0508 00:53:17.378422 1955 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:53:17.378451 kubelet[1955]: I0508 00:53:17.378440 1955 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:53:17.378451 kubelet[1955]: I0508 00:53:17.378462 1955 state_mem.go:36] "Initialized new in-memory state store" May 8 00:53:17.378623 kubelet[1955]: I0508 00:53:17.378597 1955 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:53:17.378623 kubelet[1955]: I0508 00:53:17.378608 1955 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:53:17.378623 kubelet[1955]: I0508 00:53:17.378624 1955 policy_none.go:49] "None policy: Start" May 8 00:53:17.379191 kubelet[1955]: I0508 00:53:17.379175 1955 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:53:17.379239 kubelet[1955]: I0508 00:53:17.379201 1955 state_mem.go:35] "Initializing new in-memory state store" May 8 00:53:17.379382 kubelet[1955]: I0508 00:53:17.379368 1955 state_mem.go:75] "Updated machine memory state" May 8 00:53:17.382467 kubelet[1955]: I0508 00:53:17.382449 1955 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:53:17.381000 audit[1955]: AVC avc: denied { mac_admin } for pid=1955 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:17.381000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:53:17.381000 audit[1955]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006c6a50 a1=4000d02270 a2=40006c6a20 a3=25 items=0 ppid=1 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:17.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:53:17.382691 kubelet[1955]: I0508 00:53:17.382527 1955 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:53:17.382691 kubelet[1955]: I0508 00:53:17.382655 1955 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:53:17.382691 kubelet[1955]: I0508 00:53:17.382666 1955 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:53:17.384313 kubelet[1955]: I0508 00:53:17.384295 1955 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:53:17.436683 kubelet[1955]: E0508 00:53:17.436653 1955 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 8 00:53:17.436774 kubelet[1955]: E0508 00:53:17.436695 1955 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:53:17.485922 kubelet[1955]: I0508 00:53:17.485886 1955 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 8 00:53:17.492471 kubelet[1955]: I0508 00:53:17.492444 1955 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 8 00:53:17.492593 kubelet[1955]: I0508 00:53:17.492563 1955 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 8 00:53:17.524884 kubelet[1955]: I0508 00:53:17.524738 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 8 00:53:17.625312 kubelet[1955]: I0508 00:53:17.625260 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:17.625312 kubelet[1955]: I0508 00:53:17.625316 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:17.625473 kubelet[1955]: I0508 00:53:17.625335 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:17.625473 kubelet[1955]: I0508 00:53:17.625356 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:17.625473 kubelet[1955]: I0508 00:53:17.625464 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/830f7b09b55b55417c357f5b146c95f3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"830f7b09b55b55417c357f5b146c95f3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:53:17.625567 kubelet[1955]: I0508 00:53:17.625508 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:17.625567 kubelet[1955]: I0508 00:53:17.625552 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:17.625610 kubelet[1955]: I0508 00:53:17.625585 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:53:17.736955 kubelet[1955]: E0508 00:53:17.736913 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:17.736955 kubelet[1955]: E0508 00:53:17.736951 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:17.737124 kubelet[1955]: E0508 00:53:17.737087 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:18.312679 kubelet[1955]: I0508 00:53:18.312627 1955 apiserver.go:52] "Watching apiserver" May 8 00:53:18.330263 kubelet[1955]: I0508 00:53:18.330227 1955 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 8 00:53:18.361873 kubelet[1955]: E0508 00:53:18.361827 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:18.362214 kubelet[1955]: E0508 00:53:18.362188 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:18.369861 kubelet[1955]: E0508 00:53:18.369785 1955 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:53:18.370015 kubelet[1955]: E0508 00:53:18.369992 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:18.384736 kubelet[1955]: I0508 00:53:18.384599 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.384585121 podStartE2EDuration="1.384585121s" podCreationTimestamp="2025-05-08 00:53:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:18.384545041 +0000 UTC m=+1.117296992" watchObservedRunningTime="2025-05-08 00:53:18.384585121 +0000 UTC m=+1.117337072" May 8 00:53:18.396379 kubelet[1955]: I0508 00:53:18.396306 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.396283028 podStartE2EDuration="2.396283028s" podCreationTimestamp="2025-05-08 00:53:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:18.396082147 +0000 UTC m=+1.128834098" watchObservedRunningTime="2025-05-08 00:53:18.396283028 +0000 UTC m=+1.129034939" May 8 00:53:18.402773 kubelet[1955]: I0508 00:53:18.402718 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.402702573 podStartE2EDuration="2.402702573s" podCreationTimestamp="2025-05-08 00:53:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:18.402653564 +0000 UTC m=+1.135405515" watchObservedRunningTime="2025-05-08 00:53:18.402702573 +0000 UTC m=+1.135454524" May 8 00:53:18.481000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:53:18.489766 kernel: kauditd_printk_skb: 618 callbacks suppressed May 8 00:53:18.489880 kernel: audit: type=1400 audit(1746665598.481:799): avc: denied { watch } for pid=1845 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:53:18.489906 kernel: audit: type=1300 audit(1746665598.481:799): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000cd4dc0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:18.481000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000cd4dc0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:18.481000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:18.498432 kernel: audit: type=1327 audit(1746665598.481:799): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.363114 kubelet[1955]: E0508 00:53:19.363083 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:19.950000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.950000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.958286 kernel: audit: type=1400 audit(1746665599.950:800): avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.958338 kernel: audit: type=1400 audit(1746665599.950:801): avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.958381 kernel: audit: type=1300 audit(1746665599.950:801): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117c800 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.950000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117c800 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.965732 kernel: audit: type=1327 audit(1746665599.950:801): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.965769 kernel: audit: type=1400 audit(1746665599.950:802): avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.950000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.950000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117c9c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.972923 kernel: audit: type=1300 audit(1746665599.950:802): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117c9c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.973004 kernel: audit: type=1327 audit(1746665599.950:802): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.950000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:19.950000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013ea000 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:19.950000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400123cc20 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:53:19.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:20.654665 kubelet[1955]: E0508 00:53:20.654628 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:21.971433 sudo[1354]: pam_unix(sudo:session): session closed for user root May 8 00:53:21.971000 audit[1354]: USER_END pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:21.971000 audit[1354]: CRED_DISP pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:53:21.973410 sshd[1351]: pam_unix(sshd:session): session closed for user core May 8 00:53:21.973000 audit[1351]: USER_END pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:21.973000 audit[1351]: CRED_DISP pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:21.975705 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:53:21.975926 systemd[1]: session-7.scope: Consumed 7.206s CPU time. May 8 00:53:21.976325 systemd[1]: sshd@6-10.0.0.136:22-10.0.0.1:50300.service: Deactivated successfully. May 8 00:53:21.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:21.977150 systemd-logind[1206]: Session 7 logged out. Waiting for processes to exit. May 8 00:53:21.977802 systemd-logind[1206]: Removed session 7. May 8 00:53:22.592197 kubelet[1955]: E0508 00:53:22.592157 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:23.109502 kubelet[1955]: I0508 00:53:23.109387 1955 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:53:23.109924 env[1219]: time="2025-05-08T00:53:23.109776304Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:53:23.110530 kubelet[1955]: I0508 00:53:23.110500 1955 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:53:24.026852 systemd[1]: Created slice kubepods-besteffort-pod19559bf6_3b21_4918_9281_698e258ecef7.slice. May 8 00:53:24.074309 kubelet[1955]: I0508 00:53:24.074260 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/19559bf6-3b21-4918-9281-698e258ecef7-lib-modules\") pod \"kube-proxy-cd8gv\" (UID: \"19559bf6-3b21-4918-9281-698e258ecef7\") " pod="kube-system/kube-proxy-cd8gv" May 8 00:53:24.074309 kubelet[1955]: I0508 00:53:24.074305 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcx4m\" (UniqueName: \"kubernetes.io/projected/19559bf6-3b21-4918-9281-698e258ecef7-kube-api-access-zcx4m\") pod \"kube-proxy-cd8gv\" (UID: \"19559bf6-3b21-4918-9281-698e258ecef7\") " pod="kube-system/kube-proxy-cd8gv" May 8 00:53:24.074628 kubelet[1955]: I0508 00:53:24.074330 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/19559bf6-3b21-4918-9281-698e258ecef7-kube-proxy\") pod \"kube-proxy-cd8gv\" (UID: \"19559bf6-3b21-4918-9281-698e258ecef7\") " pod="kube-system/kube-proxy-cd8gv" May 8 00:53:24.074628 kubelet[1955]: I0508 00:53:24.074348 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/19559bf6-3b21-4918-9281-698e258ecef7-xtables-lock\") pod \"kube-proxy-cd8gv\" (UID: \"19559bf6-3b21-4918-9281-698e258ecef7\") " pod="kube-system/kube-proxy-cd8gv" May 8 00:53:24.182875 kubelet[1955]: I0508 00:53:24.182821 1955 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:53:24.201145 systemd[1]: Created slice kubepods-besteffort-pod9567e53d_61ef_41b9_95e1_9faeff69ddd3.slice. May 8 00:53:24.274718 kubelet[1955]: I0508 00:53:24.274656 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9567e53d-61ef-41b9-95e1-9faeff69ddd3-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-bhfgj\" (UID: \"9567e53d-61ef-41b9-95e1-9faeff69ddd3\") " pod="tigera-operator/tigera-operator-6f6897fdc5-bhfgj" May 8 00:53:24.274982 kubelet[1955]: I0508 00:53:24.274965 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fw552\" (UniqueName: \"kubernetes.io/projected/9567e53d-61ef-41b9-95e1-9faeff69ddd3-kube-api-access-fw552\") pod \"tigera-operator-6f6897fdc5-bhfgj\" (UID: \"9567e53d-61ef-41b9-95e1-9faeff69ddd3\") " pod="tigera-operator/tigera-operator-6f6897fdc5-bhfgj" May 8 00:53:24.338910 kubelet[1955]: E0508 00:53:24.338806 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:24.339304 env[1219]: time="2025-05-08T00:53:24.339264889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cd8gv,Uid:19559bf6-3b21-4918-9281-698e258ecef7,Namespace:kube-system,Attempt:0,}" May 8 00:53:24.351928 env[1219]: time="2025-05-08T00:53:24.351864809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:24.351928 env[1219]: time="2025-05-08T00:53:24.351904757Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:24.351928 env[1219]: time="2025-05-08T00:53:24.351919168Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:24.352130 env[1219]: time="2025-05-08T00:53:24.352072438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31d9e9d0ff4e24000081edc500bce0ee3082279cddff3d524cc66f2a1f54068c pid=2052 runtime=io.containerd.runc.v2 May 8 00:53:24.367285 systemd[1]: Started cri-containerd-31d9e9d0ff4e24000081edc500bce0ee3082279cddff3d524cc66f2a1f54068c.scope. May 8 00:53:24.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.390173 kernel: kauditd_printk_skb: 10 callbacks suppressed May 8 00:53:24.390235 kernel: audit: type=1400 audit(1746665604.385:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.390257 kernel: audit: type=1400 audit(1746665604.385:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.394914 kernel: audit: type=1400 audit(1746665604.385:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.394966 kernel: audit: type=1400 audit(1746665604.385:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.399660 kernel: audit: type=1400 audit(1746665604.385:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.402101 kernel: audit: type=1400 audit(1746665604.385:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.405217 kernel: audit: type=1400 audit(1746665604.385:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.405271 kernel: audit: type=1400 audit(1746665604.385:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410214 kernel: audit: type=1400 audit(1746665604.385:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.410294 kernel: audit: type=1400 audit(1746665604.386:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit: BPF prog-id=100 op=LOAD May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000197b38 a2=10 a3=0 items=0 ppid=2052 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331643965396430666634653234303030303831656463353030626365 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001975a0 a2=3c a3=0 items=0 ppid=2052 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331643965396430666634653234303030303831656463353030626365 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit: BPF prog-id=101 op=LOAD May 8 00:53:24.386000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001978e0 a2=78 a3=0 items=0 ppid=2052 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331643965396430666634653234303030303831656463353030626365 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.386000 audit: BPF prog-id=102 op=LOAD May 8 00:53:24.386000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000197670 a2=78 a3=0 items=0 ppid=2052 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331643965396430666634653234303030303831656463353030626365 May 8 00:53:24.389000 audit: BPF prog-id=102 op=UNLOAD May 8 00:53:24.389000 audit: BPF prog-id=101 op=UNLOAD May 8 00:53:24.389000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.389000 audit: BPF prog-id=103 op=LOAD May 8 00:53:24.389000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000197b40 a2=78 a3=0 items=0 ppid=2052 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331643965396430666634653234303030303831656463353030626365 May 8 00:53:24.415705 env[1219]: time="2025-05-08T00:53:24.415664542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cd8gv,Uid:19559bf6-3b21-4918-9281-698e258ecef7,Namespace:kube-system,Attempt:0,} returns sandbox id \"31d9e9d0ff4e24000081edc500bce0ee3082279cddff3d524cc66f2a1f54068c\"" May 8 00:53:24.416927 kubelet[1955]: E0508 00:53:24.416405 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:24.418931 env[1219]: time="2025-05-08T00:53:24.418892618Z" level=info msg="CreateContainer within sandbox \"31d9e9d0ff4e24000081edc500bce0ee3082279cddff3d524cc66f2a1f54068c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:53:24.431583 env[1219]: time="2025-05-08T00:53:24.431527844Z" level=info msg="CreateContainer within sandbox \"31d9e9d0ff4e24000081edc500bce0ee3082279cddff3d524cc66f2a1f54068c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7d31a4d04a1215b495e7d8b4a7f5682165bc0aad429a44fdaf36275c2c8c0c0c\"" May 8 00:53:24.432745 env[1219]: time="2025-05-08T00:53:24.432139082Z" level=info msg="StartContainer for \"7d31a4d04a1215b495e7d8b4a7f5682165bc0aad429a44fdaf36275c2c8c0c0c\"" May 8 00:53:24.449551 systemd[1]: Started cri-containerd-7d31a4d04a1215b495e7d8b4a7f5682165bc0aad429a44fdaf36275c2c8c0c0c.scope. May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2052 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333161346430346131323135623439356537643862346137663536 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit: BPF prog-id=104 op=LOAD May 8 00:53:24.478000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2052 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333161346430346131323135623439356537643862346137663536 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit: BPF prog-id=105 op=LOAD May 8 00:53:24.478000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2052 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333161346430346131323135623439356537643862346137663536 May 8 00:53:24.478000 audit: BPF prog-id=105 op=UNLOAD May 8 00:53:24.478000 audit: BPF prog-id=104 op=UNLOAD May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.478000 audit: BPF prog-id=106 op=LOAD May 8 00:53:24.478000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2052 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333161346430346131323135623439356537643862346137663536 May 8 00:53:24.490556 env[1219]: time="2025-05-08T00:53:24.490515725Z" level=info msg="StartContainer for \"7d31a4d04a1215b495e7d8b4a7f5682165bc0aad429a44fdaf36275c2c8c0c0c\" returns successfully" May 8 00:53:24.503878 env[1219]: time="2025-05-08T00:53:24.503830518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-bhfgj,Uid:9567e53d-61ef-41b9-95e1-9faeff69ddd3,Namespace:tigera-operator,Attempt:0,}" May 8 00:53:24.520771 env[1219]: time="2025-05-08T00:53:24.520714391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:24.520865 env[1219]: time="2025-05-08T00:53:24.520784402Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:24.520865 env[1219]: time="2025-05-08T00:53:24.520809459Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:24.520991 env[1219]: time="2025-05-08T00:53:24.520961809Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3258478ed8d68ed08f1302903fe8a316601f514b2325c689ffa6dede8e9da71 pid=2130 runtime=io.containerd.runc.v2 May 8 00:53:24.531593 systemd[1]: Started cri-containerd-c3258478ed8d68ed08f1302903fe8a316601f514b2325c689ffa6dede8e9da71.scope. May 8 00:53:24.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.554000 audit: BPF prog-id=107 op=LOAD May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2130 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323538343738656438643638656430386631333032393033666538 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2130 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323538343738656438643638656430386631333032393033666538 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit: BPF prog-id=108 op=LOAD May 8 00:53:24.555000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2130 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323538343738656438643638656430386631333032393033666538 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit: BPF prog-id=109 op=LOAD May 8 00:53:24.555000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2130 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323538343738656438643638656430386631333032393033666538 May 8 00:53:24.555000 audit: BPF prog-id=109 op=UNLOAD May 8 00:53:24.555000 audit: BPF prog-id=108 op=UNLOAD May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:24.555000 audit: BPF prog-id=110 op=LOAD May 8 00:53:24.555000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2130 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333323538343738656438643638656430386631333032393033666538 May 8 00:53:24.572518 env[1219]: time="2025-05-08T00:53:24.572445506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-bhfgj,Uid:9567e53d-61ef-41b9-95e1-9faeff69ddd3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c3258478ed8d68ed08f1302903fe8a316601f514b2325c689ffa6dede8e9da71\"" May 8 00:53:24.574435 env[1219]: time="2025-05-08T00:53:24.574383897Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:53:24.692000 audit[2197]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.692000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd956010 a2=0 a3=1 items=0 ppid=2106 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:53:24.694000 audit[2198]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.694000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcfdb2190 a2=0 a3=1 items=0 ppid=2106 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:53:24.697000 audit[2199]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.697000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4d547d0 a2=0 a3=1 items=0 ppid=2106 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:53:24.698000 audit[2200]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.698000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcecd3a40 a2=0 a3=1 items=0 ppid=2106 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:53:24.699000 audit[2201]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.699000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2c823d0 a2=0 a3=1 items=0 ppid=2106 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:53:24.700000 audit[2202]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.700000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe576e870 a2=0 a3=1 items=0 ppid=2106 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:53:24.794000 audit[2203]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.794000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc06ea640 a2=0 a3=1 items=0 ppid=2106 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:53:24.797000 audit[2205]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.797000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcc623590 a2=0 a3=1 items=0 ppid=2106 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:53:24.802000 audit[2208]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.802000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe5f06c20 a2=0 a3=1 items=0 ppid=2106 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:53:24.803000 audit[2209]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.803000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe748d370 a2=0 a3=1 items=0 ppid=2106 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:53:24.805000 audit[2211]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.805000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9f63aa0 a2=0 a3=1 items=0 ppid=2106 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:53:24.807000 audit[2212]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.807000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdff41030 a2=0 a3=1 items=0 ppid=2106 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:53:24.809000 audit[2216]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.809000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd2032990 a2=0 a3=1 items=0 ppid=2106 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:53:24.813000 audit[2219]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.813000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4d42550 a2=0 a3=1 items=0 ppid=2106 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:53:24.814000 audit[2220]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.814000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc7ae330 a2=0 a3=1 items=0 ppid=2106 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:53:24.816000 audit[2222]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.816000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdbf032d0 a2=0 a3=1 items=0 ppid=2106 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:53:24.817000 audit[2223]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.817000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcb751e0 a2=0 a3=1 items=0 ppid=2106 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:53:24.819000 audit[2225]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.819000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe617d8c0 a2=0 a3=1 items=0 ppid=2106 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:24.822000 audit[2228]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.822000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd696df70 a2=0 a3=1 items=0 ppid=2106 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:24.826000 audit[2231]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.826000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdaef5090 a2=0 a3=1 items=0 ppid=2106 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:53:24.827000 audit[2232]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.827000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc31c6f30 a2=0 a3=1 items=0 ppid=2106 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:53:24.829000 audit[2234]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.829000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff1015530 a2=0 a3=1 items=0 ppid=2106 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:24.832000 audit[2237]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.832000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1390950 a2=0 a3=1 items=0 ppid=2106 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:24.833000 audit[2238]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.833000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe72f3040 a2=0 a3=1 items=0 ppid=2106 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:53:24.835000 audit[2240]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:53:24.835000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd0dbc480 a2=0 a3=1 items=0 ppid=2106 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:53:24.858000 audit[2246]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:24.858000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc5a87410 a2=0 a3=1 items=0 ppid=2106 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:24.874000 audit[2246]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:24.874000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc5a87410 a2=0 a3=1 items=0 ppid=2106 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:24.875000 audit[2251]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.875000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff17710b0 a2=0 a3=1 items=0 ppid=2106 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:53:24.878000 audit[2253]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.878000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc8399be0 a2=0 a3=1 items=0 ppid=2106 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:53:24.880000 audit[2256]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.880000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffd32c250 a2=0 a3=1 items=0 ppid=2106 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:53:24.883000 audit[2257]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.883000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5c66930 a2=0 a3=1 items=0 ppid=2106 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:53:24.884000 audit[2259]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.884000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffc72bf80 a2=0 a3=1 items=0 ppid=2106 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:53:24.886000 audit[2260]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.886000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbcc6d40 a2=0 a3=1 items=0 ppid=2106 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:53:24.887000 audit[2262]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.887000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff62f7b90 a2=0 a3=1 items=0 ppid=2106 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:53:24.890000 audit[2265]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.890000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdd19f950 a2=0 a3=1 items=0 ppid=2106 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:53:24.892000 audit[2266]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.892000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeef820b0 a2=0 a3=1 items=0 ppid=2106 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:53:24.893000 audit[2268]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.893000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd30736f0 a2=0 a3=1 items=0 ppid=2106 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:53:24.894000 audit[2269]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.894000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd8f5250 a2=0 a3=1 items=0 ppid=2106 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:53:24.897000 audit[2271]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.897000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8189000 a2=0 a3=1 items=0 ppid=2106 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:53:24.900000 audit[2274]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.900000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3ab7a80 a2=0 a3=1 items=0 ppid=2106 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:53:24.904000 audit[2277]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.904000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdda3fbc0 a2=0 a3=1 items=0 ppid=2106 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:53:24.905000 audit[2278]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.905000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4f81f50 a2=0 a3=1 items=0 ppid=2106 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:53:24.906000 audit[2280]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.906000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdc01ac10 a2=0 a3=1 items=0 ppid=2106 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:24.910000 audit[2283]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.910000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd2df6600 a2=0 a3=1 items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:53:24.911000 audit[2284]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.911000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7fe5d10 a2=0 a3=1 items=0 ppid=2106 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:53:24.914000 audit[2286]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.914000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd9d9cfe0 a2=0 a3=1 items=0 ppid=2106 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:53:24.915000 audit[2287]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.915000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb53dbf0 a2=0 a3=1 items=0 ppid=2106 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:53:24.917000 audit[2289]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.917000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe2cd7800 a2=0 a3=1 items=0 ppid=2106 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:24.920000 audit[2292]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:53:24.920000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc281870 a2=0 a3=1 items=0 ppid=2106 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:53:24.923000 audit[2294]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:53:24.923000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd2adc8b0 a2=0 a3=1 items=0 ppid=2106 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.923000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:24.923000 audit[2294]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:53:24.923000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd2adc8b0 a2=0 a3=1 items=0 ppid=2106 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:24.923000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:25.376479 kubelet[1955]: E0508 00:53:25.376447 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:25.385788 kubelet[1955]: I0508 00:53:25.385734 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-cd8gv" podStartSLOduration=1.385721941 podStartE2EDuration="1.385721941s" podCreationTimestamp="2025-05-08 00:53:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:25.385576402 +0000 UTC m=+8.118328353" watchObservedRunningTime="2025-05-08 00:53:25.385721941 +0000 UTC m=+8.118473892" May 8 00:53:26.203934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3144806933.mount: Deactivated successfully. May 8 00:53:26.667061 env[1219]: time="2025-05-08T00:53:26.667017315Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:26.668908 env[1219]: time="2025-05-08T00:53:26.668883078Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:26.670381 env[1219]: time="2025-05-08T00:53:26.670356348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:26.671571 env[1219]: time="2025-05-08T00:53:26.671527544Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:26.672223 env[1219]: time="2025-05-08T00:53:26.672190331Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 8 00:53:26.674780 env[1219]: time="2025-05-08T00:53:26.674438821Z" level=info msg="CreateContainer within sandbox \"c3258478ed8d68ed08f1302903fe8a316601f514b2325c689ffa6dede8e9da71\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:53:26.682701 env[1219]: time="2025-05-08T00:53:26.682659322Z" level=info msg="CreateContainer within sandbox \"c3258478ed8d68ed08f1302903fe8a316601f514b2325c689ffa6dede8e9da71\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f49229c99927b6e1bd8ad3625018124156c15598ac17de1d3e33c15b3910356d\"" May 8 00:53:26.683114 env[1219]: time="2025-05-08T00:53:26.683088479Z" level=info msg="StartContainer for \"f49229c99927b6e1bd8ad3625018124156c15598ac17de1d3e33c15b3910356d\"" May 8 00:53:26.702986 systemd[1]: Started cri-containerd-f49229c99927b6e1bd8ad3625018124156c15598ac17de1d3e33c15b3910356d.scope. May 8 00:53:26.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.720000 audit: BPF prog-id=111 op=LOAD May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2130 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393232396339393932376236653162643861643336323530313831 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2130 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393232396339393932376236653162643861643336323530313831 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit: BPF prog-id=112 op=LOAD May 8 00:53:26.721000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2130 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393232396339393932376236653162643861643336323530313831 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit: BPF prog-id=113 op=LOAD May 8 00:53:26.721000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2130 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393232396339393932376236653162643861643336323530313831 May 8 00:53:26.721000 audit: BPF prog-id=113 op=UNLOAD May 8 00:53:26.721000 audit: BPF prog-id=112 op=UNLOAD May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:26.721000 audit: BPF prog-id=114 op=LOAD May 8 00:53:26.721000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2130 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:26.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393232396339393932376236653162643861643336323530313831 May 8 00:53:26.736182 env[1219]: time="2025-05-08T00:53:26.736115316Z" level=info msg="StartContainer for \"f49229c99927b6e1bd8ad3625018124156c15598ac17de1d3e33c15b3910356d\" returns successfully" May 8 00:53:27.204060 systemd[1]: run-containerd-runc-k8s.io-f49229c99927b6e1bd8ad3625018124156c15598ac17de1d3e33c15b3910356d-runc.JCF7rG.mount: Deactivated successfully. May 8 00:53:27.324880 kubelet[1955]: E0508 00:53:27.324632 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:27.380273 kubelet[1955]: E0508 00:53:27.380241 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:27.395900 kubelet[1955]: I0508 00:53:27.395853 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-bhfgj" podStartSLOduration=1.296442137 podStartE2EDuration="3.395819426s" podCreationTimestamp="2025-05-08 00:53:24 +0000 UTC" firstStartedPulling="2025-05-08 00:53:24.573806563 +0000 UTC m=+7.306558514" lastFinishedPulling="2025-05-08 00:53:26.673183852 +0000 UTC m=+9.405935803" observedRunningTime="2025-05-08 00:53:27.39581018 +0000 UTC m=+10.128562171" watchObservedRunningTime="2025-05-08 00:53:27.395819426 +0000 UTC m=+10.128571377" May 8 00:53:29.992916 update_engine[1207]: I0508 00:53:29.992874 1207 update_attempter.cc:509] Updating boot flags... May 8 00:53:30.314000 audit[2351]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.318614 kernel: kauditd_printk_skb: 357 callbacks suppressed May 8 00:53:30.318717 kernel: audit: type=1325 audit(1746665610.314:920): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.318744 kernel: audit: type=1300 audit(1746665610.314:920): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffeb319fe0 a2=0 a3=1 items=0 ppid=2106 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.314000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffeb319fe0 a2=0 a3=1 items=0 ppid=2106 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.324109 kernel: audit: type=1327 audit(1746665610.314:920): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.325000 audit[2351]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.325000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeb319fe0 a2=0 a3=1 items=0 ppid=2106 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.331900 kernel: audit: type=1325 audit(1746665610.325:921): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.331965 kernel: audit: type=1300 audit(1746665610.325:921): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeb319fe0 a2=0 a3=1 items=0 ppid=2106 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.331988 kernel: audit: type=1327 audit(1746665610.325:921): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.339000 audit[2353]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.339000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd8dbaa80 a2=0 a3=1 items=0 ppid=2106 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.346241 kernel: audit: type=1325 audit(1746665610.339:922): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.346288 kernel: audit: type=1300 audit(1746665610.339:922): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd8dbaa80 a2=0 a3=1 items=0 ppid=2106 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.346309 kernel: audit: type=1327 audit(1746665610.339:922): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.356000 audit[2353]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.356000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd8dbaa80 a2=0 a3=1 items=0 ppid=2106 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:30.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:30.359858 kernel: audit: type=1325 audit(1746665610.356:923): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:30.662596 kubelet[1955]: E0508 00:53:30.662507 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:31.218014 systemd[1]: Created slice kubepods-besteffort-podcf16c498_4e99_44ab_8640_46a801294a54.slice. May 8 00:53:31.227048 kubelet[1955]: I0508 00:53:31.227004 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cf16c498-4e99-44ab-8640-46a801294a54-typha-certs\") pod \"calico-typha-769c98f795-64566\" (UID: \"cf16c498-4e99-44ab-8640-46a801294a54\") " pod="calico-system/calico-typha-769c98f795-64566" May 8 00:53:31.227048 kubelet[1955]: I0508 00:53:31.227045 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cf16c498-4e99-44ab-8640-46a801294a54-tigera-ca-bundle\") pod \"calico-typha-769c98f795-64566\" (UID: \"cf16c498-4e99-44ab-8640-46a801294a54\") " pod="calico-system/calico-typha-769c98f795-64566" May 8 00:53:31.227230 kubelet[1955]: I0508 00:53:31.227071 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4stfd\" (UniqueName: \"kubernetes.io/projected/cf16c498-4e99-44ab-8640-46a801294a54-kube-api-access-4stfd\") pod \"calico-typha-769c98f795-64566\" (UID: \"cf16c498-4e99-44ab-8640-46a801294a54\") " pod="calico-system/calico-typha-769c98f795-64566" May 8 00:53:31.367000 audit[2357]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:31.367000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff0815920 a2=0 a3=1 items=0 ppid=2106 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:31.376000 audit[2357]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:31.376000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff0815920 a2=0 a3=1 items=0 ppid=2106 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:31.403025 kubelet[1955]: W0508 00:53:31.402984 1955 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 8 00:53:31.403122 kubelet[1955]: E0508 00:53:31.403026 1955 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"node-certs\" is forbidden: User \"system:node:localhost\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 8 00:53:31.407627 systemd[1]: Created slice kubepods-besteffort-pod1bc290b7_a1f6_46bd_aa4d_af5d6fe36d51.slice. May 8 00:53:31.428524 kubelet[1955]: I0508 00:53:31.428487 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-lib-modules\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428524 kubelet[1955]: I0508 00:53:31.428527 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-policysync\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428653 kubelet[1955]: I0508 00:53:31.428544 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-cni-bin-dir\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428653 kubelet[1955]: I0508 00:53:31.428558 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-var-lib-calico\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428653 kubelet[1955]: I0508 00:53:31.428574 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-cni-net-dir\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428653 kubelet[1955]: I0508 00:53:31.428590 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-flexvol-driver-host\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428653 kubelet[1955]: I0508 00:53:31.428608 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-xtables-lock\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428768 kubelet[1955]: I0508 00:53:31.428622 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q69d6\" (UniqueName: \"kubernetes.io/projected/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-kube-api-access-q69d6\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428768 kubelet[1955]: I0508 00:53:31.428640 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-tigera-ca-bundle\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428768 kubelet[1955]: I0508 00:53:31.428655 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-var-run-calico\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428768 kubelet[1955]: I0508 00:53:31.428670 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-cni-log-dir\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.428768 kubelet[1955]: I0508 00:53:31.428687 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51-node-certs\") pod \"calico-node-mnql6\" (UID: \"1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51\") " pod="calico-system/calico-node-mnql6" May 8 00:53:31.523452 kubelet[1955]: E0508 00:53:31.523408 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:31.523825 env[1219]: time="2025-05-08T00:53:31.523784910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769c98f795-64566,Uid:cf16c498-4e99-44ab-8640-46a801294a54,Namespace:calico-system,Attempt:0,}" May 8 00:53:31.537683 env[1219]: time="2025-05-08T00:53:31.537619382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:31.537850 env[1219]: time="2025-05-08T00:53:31.537808436Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:31.537949 env[1219]: time="2025-05-08T00:53:31.537926015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:31.538285 env[1219]: time="2025-05-08T00:53:31.538256060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94bacc8fc95b91fd6338f56c6cf85107aa1781ed2775917cb0211475d2b35b74 pid=2364 runtime=io.containerd.runc.v2 May 8 00:53:31.542913 kubelet[1955]: E0508 00:53:31.541953 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.542913 kubelet[1955]: W0508 00:53:31.541973 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.542913 kubelet[1955]: E0508 00:53:31.541991 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.553738 systemd[1]: Started cri-containerd-94bacc8fc95b91fd6338f56c6cf85107aa1781ed2775917cb0211475d2b35b74.scope. May 8 00:53:31.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.587000 audit: BPF prog-id=115 op=LOAD May 8 00:53:31.597000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.597000 audit[2375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934626163633866633935623931666436333338663536633663663835 May 8 00:53:31.598000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.598000 audit[2375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934626163633866633935623931666436333338663536633663663835 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.599000 audit: BPF prog-id=116 op=LOAD May 8 00:53:31.599000 audit[2375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934626163633866633935623931666436333338663536633663663835 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.603934 kubelet[1955]: E0508 00:53:31.603664 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:31.600000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.600000 audit: BPF prog-id=117 op=LOAD May 8 00:53:31.600000 audit[2375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934626163633866633935623931666436333338663536633663663835 May 8 00:53:31.603000 audit: BPF prog-id=117 op=UNLOAD May 8 00:53:31.603000 audit: BPF prog-id=116 op=UNLOAD May 8 00:53:31.604000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:31.604000 audit: BPF prog-id=118 op=LOAD May 8 00:53:31.604000 audit[2375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2364 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:31.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934626163633866633935623931666436333338663536633663663835 May 8 00:53:31.625572 kubelet[1955]: E0508 00:53:31.625542 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.625572 kubelet[1955]: W0508 00:53:31.625569 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.625773 kubelet[1955]: E0508 00:53:31.625587 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.625773 kubelet[1955]: E0508 00:53:31.625745 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.625773 kubelet[1955]: W0508 00:53:31.625754 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.625773 kubelet[1955]: E0508 00:53:31.625762 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626200 kubelet[1955]: E0508 00:53:31.625906 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626200 kubelet[1955]: W0508 00:53:31.625915 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626200 kubelet[1955]: E0508 00:53:31.625923 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626200 kubelet[1955]: E0508 00:53:31.626067 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626200 kubelet[1955]: W0508 00:53:31.626074 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626200 kubelet[1955]: E0508 00:53:31.626084 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626340 kubelet[1955]: E0508 00:53:31.626284 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626340 kubelet[1955]: W0508 00:53:31.626293 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626340 kubelet[1955]: E0508 00:53:31.626300 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626471 kubelet[1955]: E0508 00:53:31.626457 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626471 kubelet[1955]: W0508 00:53:31.626469 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626535 kubelet[1955]: E0508 00:53:31.626478 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626629 kubelet[1955]: E0508 00:53:31.626616 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626629 kubelet[1955]: W0508 00:53:31.626626 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626688 kubelet[1955]: E0508 00:53:31.626643 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626793 kubelet[1955]: E0508 00:53:31.626776 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626793 kubelet[1955]: W0508 00:53:31.626791 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626872 kubelet[1955]: E0508 00:53:31.626798 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.626950 kubelet[1955]: E0508 00:53:31.626937 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.626990 kubelet[1955]: W0508 00:53:31.626953 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.626990 kubelet[1955]: E0508 00:53:31.626962 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.627093 kubelet[1955]: E0508 00:53:31.627080 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.627136 kubelet[1955]: W0508 00:53:31.627096 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.627136 kubelet[1955]: E0508 00:53:31.627105 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.627276 kubelet[1955]: E0508 00:53:31.627260 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.627276 kubelet[1955]: W0508 00:53:31.627273 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.627341 kubelet[1955]: E0508 00:53:31.627283 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.627504 kubelet[1955]: E0508 00:53:31.627488 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.627504 kubelet[1955]: W0508 00:53:31.627502 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.627568 kubelet[1955]: E0508 00:53:31.627514 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.627824 kubelet[1955]: E0508 00:53:31.627805 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.627906 kubelet[1955]: W0508 00:53:31.627889 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.627906 kubelet[1955]: E0508 00:53:31.627903 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.628190 kubelet[1955]: E0508 00:53:31.628174 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.628190 kubelet[1955]: W0508 00:53:31.628187 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.628266 kubelet[1955]: E0508 00:53:31.628196 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.628394 kubelet[1955]: E0508 00:53:31.628372 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.628394 kubelet[1955]: W0508 00:53:31.628391 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.628467 kubelet[1955]: E0508 00:53:31.628400 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.628683 kubelet[1955]: E0508 00:53:31.628563 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.628683 kubelet[1955]: W0508 00:53:31.628575 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.628683 kubelet[1955]: E0508 00:53:31.628589 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.628788 kubelet[1955]: E0508 00:53:31.628741 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.628788 kubelet[1955]: W0508 00:53:31.628760 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.628788 kubelet[1955]: E0508 00:53:31.628768 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.628943 kubelet[1955]: E0508 00:53:31.628928 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.628943 kubelet[1955]: W0508 00:53:31.628940 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.629019 kubelet[1955]: E0508 00:53:31.628948 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.629088 kubelet[1955]: E0508 00:53:31.629072 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.629125 kubelet[1955]: W0508 00:53:31.629089 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.629125 kubelet[1955]: E0508 00:53:31.629098 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.629275 kubelet[1955]: E0508 00:53:31.629238 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.629275 kubelet[1955]: W0508 00:53:31.629249 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.629275 kubelet[1955]: E0508 00:53:31.629258 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.629996 kubelet[1955]: E0508 00:53:31.629967 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.629996 kubelet[1955]: W0508 00:53:31.629992 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.630078 kubelet[1955]: E0508 00:53:31.630003 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.630078 kubelet[1955]: I0508 00:53:31.630028 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f0773fa0-2f79-4143-a60d-2de26f98e45d-kubelet-dir\") pod \"csi-node-driver-ttxxq\" (UID: \"f0773fa0-2f79-4143-a60d-2de26f98e45d\") " pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:31.630200 kubelet[1955]: E0508 00:53:31.630175 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.630200 kubelet[1955]: W0508 00:53:31.630193 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.630255 kubelet[1955]: E0508 00:53:31.630203 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.630255 kubelet[1955]: I0508 00:53:31.630217 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f0773fa0-2f79-4143-a60d-2de26f98e45d-socket-dir\") pod \"csi-node-driver-ttxxq\" (UID: \"f0773fa0-2f79-4143-a60d-2de26f98e45d\") " pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:31.630404 kubelet[1955]: E0508 00:53:31.630386 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.630404 kubelet[1955]: W0508 00:53:31.630401 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.630476 kubelet[1955]: E0508 00:53:31.630418 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.630476 kubelet[1955]: I0508 00:53:31.630432 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5xfz2\" (UniqueName: \"kubernetes.io/projected/f0773fa0-2f79-4143-a60d-2de26f98e45d-kube-api-access-5xfz2\") pod \"csi-node-driver-ttxxq\" (UID: \"f0773fa0-2f79-4143-a60d-2de26f98e45d\") " pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:31.630621 kubelet[1955]: E0508 00:53:31.630606 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.630657 kubelet[1955]: W0508 00:53:31.630621 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.630657 kubelet[1955]: E0508 00:53:31.630635 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.630803 kubelet[1955]: E0508 00:53:31.630792 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.630803 kubelet[1955]: W0508 00:53:31.630803 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.630875 kubelet[1955]: E0508 00:53:31.630816 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.630926 kubelet[1955]: I0508 00:53:31.630830 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f0773fa0-2f79-4143-a60d-2de26f98e45d-registration-dir\") pod \"csi-node-driver-ttxxq\" (UID: \"f0773fa0-2f79-4143-a60d-2de26f98e45d\") " pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:31.631059 kubelet[1955]: E0508 00:53:31.631040 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.631094 kubelet[1955]: W0508 00:53:31.631063 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.631094 kubelet[1955]: E0508 00:53:31.631083 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.631252 env[1219]: time="2025-05-08T00:53:31.631218142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769c98f795-64566,Uid:cf16c498-4e99-44ab-8640-46a801294a54,Namespace:calico-system,Attempt:0,} returns sandbox id \"94bacc8fc95b91fd6338f56c6cf85107aa1781ed2775917cb0211475d2b35b74\"" May 8 00:53:31.631492 kubelet[1955]: E0508 00:53:31.631445 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.631492 kubelet[1955]: W0508 00:53:31.631459 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.631492 kubelet[1955]: E0508 00:53:31.631469 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.631680 kubelet[1955]: E0508 00:53:31.631663 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.631680 kubelet[1955]: W0508 00:53:31.631676 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.631753 kubelet[1955]: E0508 00:53:31.631691 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.631925 kubelet[1955]: E0508 00:53:31.631910 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.631980 kubelet[1955]: W0508 00:53:31.631930 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.631980 kubelet[1955]: E0508 00:53:31.631968 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.632136 kubelet[1955]: E0508 00:53:31.632123 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.632179 kubelet[1955]: W0508 00:53:31.632136 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.632210 kubelet[1955]: E0508 00:53:31.632191 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632338 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.632738 kubelet[1955]: W0508 00:53:31.632352 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632412 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632437 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632525 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.632738 kubelet[1955]: W0508 00:53:31.632534 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632574 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.632738 kubelet[1955]: I0508 00:53:31.632600 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f0773fa0-2f79-4143-a60d-2de26f98e45d-varrun\") pod \"csi-node-driver-ttxxq\" (UID: \"f0773fa0-2f79-4143-a60d-2de26f98e45d\") " pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:31.632738 kubelet[1955]: E0508 00:53:31.632676 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.633011 kubelet[1955]: W0508 00:53:31.632685 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.633011 kubelet[1955]: E0508 00:53:31.632696 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.633335 kubelet[1955]: E0508 00:53:31.633252 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.633335 kubelet[1955]: W0508 00:53:31.633270 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.633335 kubelet[1955]: E0508 00:53:31.633282 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.633550 kubelet[1955]: E0508 00:53:31.633519 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.633550 kubelet[1955]: W0508 00:53:31.633552 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.633629 kubelet[1955]: E0508 00:53:31.633564 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.633788 env[1219]: time="2025-05-08T00:53:31.633759892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:53:31.633921 kubelet[1955]: E0508 00:53:31.633904 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.633921 kubelet[1955]: W0508 00:53:31.633919 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.634068 kubelet[1955]: E0508 00:53:31.634053 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.733892 kubelet[1955]: E0508 00:53:31.733858 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.733892 kubelet[1955]: W0508 00:53:31.733879 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.733892 kubelet[1955]: E0508 00:53:31.733895 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.734235 kubelet[1955]: E0508 00:53:31.734061 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.734235 kubelet[1955]: W0508 00:53:31.734069 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.734235 kubelet[1955]: E0508 00:53:31.734077 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.734309 kubelet[1955]: E0508 00:53:31.734271 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.734309 kubelet[1955]: W0508 00:53:31.734280 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.734309 kubelet[1955]: E0508 00:53:31.734297 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.734509 kubelet[1955]: E0508 00:53:31.734476 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.734509 kubelet[1955]: W0508 00:53:31.734488 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.734509 kubelet[1955]: E0508 00:53:31.734500 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.734715 kubelet[1955]: E0508 00:53:31.734695 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.734715 kubelet[1955]: W0508 00:53:31.734707 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.734766 kubelet[1955]: E0508 00:53:31.734719 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.734910 kubelet[1955]: E0508 00:53:31.734888 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.734910 kubelet[1955]: W0508 00:53:31.734899 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.734910 kubelet[1955]: E0508 00:53:31.734910 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735074 kubelet[1955]: E0508 00:53:31.735062 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.735074 kubelet[1955]: W0508 00:53:31.735072 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.735125 kubelet[1955]: E0508 00:53:31.735083 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735316 kubelet[1955]: E0508 00:53:31.735301 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.735316 kubelet[1955]: W0508 00:53:31.735314 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.735382 kubelet[1955]: E0508 00:53:31.735328 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735519 kubelet[1955]: E0508 00:53:31.735494 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.735519 kubelet[1955]: W0508 00:53:31.735506 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.735576 kubelet[1955]: E0508 00:53:31.735552 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735659 kubelet[1955]: E0508 00:53:31.735648 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.735659 kubelet[1955]: W0508 00:53:31.735659 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.735703 kubelet[1955]: E0508 00:53:31.735680 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735817 kubelet[1955]: E0508 00:53:31.735785 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.735817 kubelet[1955]: W0508 00:53:31.735791 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.735817 kubelet[1955]: E0508 00:53:31.735808 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.735983 kubelet[1955]: E0508 00:53:31.735969 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.736009 kubelet[1955]: W0508 00:53:31.735983 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.736009 kubelet[1955]: E0508 00:53:31.736005 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.736116 kubelet[1955]: E0508 00:53:31.736105 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.736143 kubelet[1955]: W0508 00:53:31.736115 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.736143 kubelet[1955]: E0508 00:53:31.736132 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.736270 kubelet[1955]: E0508 00:53:31.736260 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.736298 kubelet[1955]: W0508 00:53:31.736270 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.736298 kubelet[1955]: E0508 00:53:31.736283 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.736562 kubelet[1955]: E0508 00:53:31.736546 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.736562 kubelet[1955]: W0508 00:53:31.736561 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.736627 kubelet[1955]: E0508 00:53:31.736576 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.736862 kubelet[1955]: E0508 00:53:31.736843 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.736862 kubelet[1955]: W0508 00:53:31.736859 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.736938 kubelet[1955]: E0508 00:53:31.736874 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.737102 kubelet[1955]: E0508 00:53:31.737085 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.737102 kubelet[1955]: W0508 00:53:31.737098 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.737173 kubelet[1955]: E0508 00:53:31.737126 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.737288 kubelet[1955]: E0508 00:53:31.737272 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.737288 kubelet[1955]: W0508 00:53:31.737283 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.737346 kubelet[1955]: E0508 00:53:31.737304 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.737473 kubelet[1955]: E0508 00:53:31.737452 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.737473 kubelet[1955]: W0508 00:53:31.737464 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.737537 kubelet[1955]: E0508 00:53:31.737485 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.737636 kubelet[1955]: E0508 00:53:31.737616 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.737636 kubelet[1955]: W0508 00:53:31.737627 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.737699 kubelet[1955]: E0508 00:53:31.737646 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.737788 kubelet[1955]: E0508 00:53:31.737768 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.737788 kubelet[1955]: W0508 00:53:31.737778 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.737872 kubelet[1955]: E0508 00:53:31.737792 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.738044 kubelet[1955]: E0508 00:53:31.738027 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.738092 kubelet[1955]: W0508 00:53:31.738056 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.738092 kubelet[1955]: E0508 00:53:31.738073 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.738395 kubelet[1955]: E0508 00:53:31.738294 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.738395 kubelet[1955]: W0508 00:53:31.738307 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.738395 kubelet[1955]: E0508 00:53:31.738335 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.738740 kubelet[1955]: E0508 00:53:31.738720 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.738788 kubelet[1955]: W0508 00:53:31.738742 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.738788 kubelet[1955]: E0508 00:53:31.738759 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.738982 kubelet[1955]: E0508 00:53:31.738968 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.738982 kubelet[1955]: W0508 00:53:31.738981 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.739054 kubelet[1955]: E0508 00:53:31.738990 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.739406 kubelet[1955]: E0508 00:53:31.739334 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.739406 kubelet[1955]: W0508 00:53:31.739360 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.739406 kubelet[1955]: E0508 00:53:31.739371 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.747268 kubelet[1955]: E0508 00:53:31.747239 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.747268 kubelet[1955]: W0508 00:53:31.747258 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.747268 kubelet[1955]: E0508 00:53:31.747271 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.836299 kubelet[1955]: E0508 00:53:31.836212 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.836299 kubelet[1955]: W0508 00:53:31.836231 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.836299 kubelet[1955]: E0508 00:53:31.836244 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:31.936977 kubelet[1955]: E0508 00:53:31.936945 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:31.936977 kubelet[1955]: W0508 00:53:31.936967 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:31.936977 kubelet[1955]: E0508 00:53:31.936983 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.037844 kubelet[1955]: E0508 00:53:32.037797 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.037844 kubelet[1955]: W0508 00:53:32.037815 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.037844 kubelet[1955]: E0508 00:53:32.037828 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.139066 kubelet[1955]: E0508 00:53:32.138765 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.139066 kubelet[1955]: W0508 00:53:32.138785 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.139066 kubelet[1955]: E0508 00:53:32.138799 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.240229 kubelet[1955]: E0508 00:53:32.240185 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.240229 kubelet[1955]: W0508 00:53:32.240205 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.240229 kubelet[1955]: E0508 00:53:32.240225 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.341518 kubelet[1955]: E0508 00:53:32.341433 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.341518 kubelet[1955]: W0508 00:53:32.341455 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.341518 kubelet[1955]: E0508 00:53:32.341471 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.394627 kubelet[1955]: E0508 00:53:32.394305 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.394627 kubelet[1955]: W0508 00:53:32.394329 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.394627 kubelet[1955]: E0508 00:53:32.394345 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.599799 kubelet[1955]: E0508 00:53:32.599769 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:32.609414 kubelet[1955]: E0508 00:53:32.609376 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:32.609983 env[1219]: time="2025-05-08T00:53:32.609767837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mnql6,Uid:1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51,Namespace:calico-system,Attempt:0,}" May 8 00:53:32.628918 env[1219]: time="2025-05-08T00:53:32.627714415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:32.628918 env[1219]: time="2025-05-08T00:53:32.627753834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:32.628918 env[1219]: time="2025-05-08T00:53:32.627764119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:32.628918 env[1219]: time="2025-05-08T00:53:32.627934120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421 pid=2480 runtime=io.containerd.runc.v2 May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637203 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.640053 kubelet[1955]: W0508 00:53:32.637226 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637244 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637551 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.640053 kubelet[1955]: W0508 00:53:32.637563 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637573 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637771 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.640053 kubelet[1955]: W0508 00:53:32.637779 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637787 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.640053 kubelet[1955]: E0508 00:53:32.637972 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.646493 kubelet[1955]: W0508 00:53:32.637981 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.637990 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.638155 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.646493 kubelet[1955]: W0508 00:53:32.638163 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.638171 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.638319 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.646493 kubelet[1955]: W0508 00:53:32.638326 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.638336 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.646493 kubelet[1955]: E0508 00:53:32.638494 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.646493 kubelet[1955]: W0508 00:53:32.638502 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.638510 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.638665 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.647274 kubelet[1955]: W0508 00:53:32.638673 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.638680 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.638823 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.647274 kubelet[1955]: W0508 00:53:32.638830 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.638859 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.639506 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.647274 kubelet[1955]: W0508 00:53:32.639515 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.647274 kubelet[1955]: E0508 00:53:32.639524 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.639679 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648377 kubelet[1955]: W0508 00:53:32.639686 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.639693 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.639817 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648377 kubelet[1955]: W0508 00:53:32.639823 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.639830 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.640086 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648377 kubelet[1955]: W0508 00:53:32.640101 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.640110 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648377 kubelet[1955]: E0508 00:53:32.640700 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648743 kubelet[1955]: W0508 00:53:32.640724 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.640733 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.640950 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648743 kubelet[1955]: W0508 00:53:32.640959 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.640987 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.641267 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648743 kubelet[1955]: W0508 00:53:32.641278 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.641287 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.648743 kubelet[1955]: E0508 00:53:32.641459 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.648743 kubelet[1955]: W0508 00:53:32.641467 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.649112 kubelet[1955]: E0508 00:53:32.641474 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.649112 kubelet[1955]: E0508 00:53:32.641600 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.649112 kubelet[1955]: W0508 00:53:32.641614 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.649112 kubelet[1955]: E0508 00:53:32.641625 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.649112 kubelet[1955]: E0508 00:53:32.642727 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.649112 kubelet[1955]: W0508 00:53:32.642750 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.649112 kubelet[1955]: E0508 00:53:32.642806 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.652453 systemd[1]: Started cri-containerd-0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421.scope. May 8 00:53:32.653131 kubelet[1955]: E0508 00:53:32.653013 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.653131 kubelet[1955]: W0508 00:53:32.653030 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.653131 kubelet[1955]: E0508 00:53:32.653051 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.653631 kubelet[1955]: E0508 00:53:32.653585 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.653631 kubelet[1955]: W0508 00:53:32.653601 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.653631 kubelet[1955]: E0508 00:53:32.653613 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.656993 kubelet[1955]: E0508 00:53:32.656971 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.656993 kubelet[1955]: W0508 00:53:32.656996 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.657113 kubelet[1955]: E0508 00:53:32.657011 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.657313 kubelet[1955]: E0508 00:53:32.657300 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.657345 kubelet[1955]: W0508 00:53:32.657314 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.657345 kubelet[1955]: E0508 00:53:32.657325 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.659462 kubelet[1955]: E0508 00:53:32.659442 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.659462 kubelet[1955]: W0508 00:53:32.659459 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.659619 kubelet[1955]: E0508 00:53:32.659471 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.659891 kubelet[1955]: E0508 00:53:32.659831 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:32.659891 kubelet[1955]: W0508 00:53:32.659890 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:32.659891 kubelet[1955]: E0508 00:53:32.659903 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:32.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.669000 audit: BPF prog-id=119 op=LOAD May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2480 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:32.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363863613063643165393739343333373438653163356238363433 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2480 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:32.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363863613063643165393739343333373438653163356238363433 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit: BPF prog-id=120 op=LOAD May 8 00:53:32.670000 audit[2491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2480 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:32.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363863613063643165393739343333373438653163356238363433 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit: BPF prog-id=121 op=LOAD May 8 00:53:32.670000 audit[2491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2480 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:32.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363863613063643165393739343333373438653163356238363433 May 8 00:53:32.670000 audit: BPF prog-id=121 op=UNLOAD May 8 00:53:32.670000 audit: BPF prog-id=120 op=UNLOAD May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:32.670000 audit: BPF prog-id=122 op=LOAD May 8 00:53:32.670000 audit[2491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2480 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:32.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363863613063643165393739343333373438653163356238363433 May 8 00:53:32.685579 env[1219]: time="2025-05-08T00:53:32.685539684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mnql6,Uid:1bc290b7-a1f6-46bd-aa4d-af5d6fe36d51,Namespace:calico-system,Attempt:0,} returns sandbox id \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\"" May 8 00:53:32.686824 kubelet[1955]: E0508 00:53:32.686341 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:33.129815 env[1219]: time="2025-05-08T00:53:33.129771176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:33.131147 env[1219]: time="2025-05-08T00:53:33.131115466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:33.132427 env[1219]: time="2025-05-08T00:53:33.132377398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:33.134895 env[1219]: time="2025-05-08T00:53:33.134858483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:33.135226 env[1219]: time="2025-05-08T00:53:33.135181869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 8 00:53:33.136562 env[1219]: time="2025-05-08T00:53:33.136530321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:53:33.142482 env[1219]: time="2025-05-08T00:53:33.142448604Z" level=info msg="CreateContainer within sandbox \"94bacc8fc95b91fd6338f56c6cf85107aa1781ed2775917cb0211475d2b35b74\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:53:33.151525 env[1219]: time="2025-05-08T00:53:33.151479258Z" level=info msg="CreateContainer within sandbox \"94bacc8fc95b91fd6338f56c6cf85107aa1781ed2775917cb0211475d2b35b74\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"78d20567939030a55ba4d5cc732a9b103817b7c2bcdc65086a97cae7f971924b\"" May 8 00:53:33.152754 env[1219]: time="2025-05-08T00:53:33.152725263Z" level=info msg="StartContainer for \"78d20567939030a55ba4d5cc732a9b103817b7c2bcdc65086a97cae7f971924b\"" May 8 00:53:33.168996 systemd[1]: Started cri-containerd-78d20567939030a55ba4d5cc732a9b103817b7c2bcdc65086a97cae7f971924b.scope. May 8 00:53:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.199000 audit: BPF prog-id=123 op=LOAD May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2364 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:33.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643230353637393339303330613535626134643563633733326139 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2364 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:33.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643230353637393339303330613535626134643563633733326139 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit: BPF prog-id=124 op=LOAD May 8 00:53:33.200000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2364 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:33.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643230353637393339303330613535626134643563633733326139 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit: BPF prog-id=125 op=LOAD May 8 00:53:33.200000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2364 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:33.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643230353637393339303330613535626134643563633733326139 May 8 00:53:33.200000 audit: BPF prog-id=125 op=UNLOAD May 8 00:53:33.200000 audit: BPF prog-id=124 op=UNLOAD May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:33.200000 audit: BPF prog-id=126 op=LOAD May 8 00:53:33.200000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2364 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:33.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643230353637393339303330613535626134643563633733326139 May 8 00:53:33.225590 env[1219]: time="2025-05-08T00:53:33.225545678Z" level=info msg="StartContainer for \"78d20567939030a55ba4d5cc732a9b103817b7c2bcdc65086a97cae7f971924b\" returns successfully" May 8 00:53:33.332587 kubelet[1955]: E0508 00:53:33.332295 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:33.391636 kubelet[1955]: E0508 00:53:33.391156 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:33.465518 kubelet[1955]: E0508 00:53:33.465474 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.465518 kubelet[1955]: W0508 00:53:33.465499 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.465518 kubelet[1955]: E0508 00:53:33.465516 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.465709 kubelet[1955]: E0508 00:53:33.465669 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.465709 kubelet[1955]: W0508 00:53:33.465677 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.465709 kubelet[1955]: E0508 00:53:33.465685 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.465861 kubelet[1955]: E0508 00:53:33.465816 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.465861 kubelet[1955]: W0508 00:53:33.465828 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.465861 kubelet[1955]: E0508 00:53:33.465847 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466001 kubelet[1955]: E0508 00:53:33.465977 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466001 kubelet[1955]: W0508 00:53:33.465991 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466001 kubelet[1955]: E0508 00:53:33.465998 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466156 kubelet[1955]: E0508 00:53:33.466133 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466156 kubelet[1955]: W0508 00:53:33.466145 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466156 kubelet[1955]: E0508 00:53:33.466152 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466305 kubelet[1955]: E0508 00:53:33.466283 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466305 kubelet[1955]: W0508 00:53:33.466294 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466305 kubelet[1955]: E0508 00:53:33.466301 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466443 kubelet[1955]: E0508 00:53:33.466432 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466443 kubelet[1955]: W0508 00:53:33.466443 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466492 kubelet[1955]: E0508 00:53:33.466450 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466584 kubelet[1955]: E0508 00:53:33.466574 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466609 kubelet[1955]: W0508 00:53:33.466584 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466609 kubelet[1955]: E0508 00:53:33.466591 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466748 kubelet[1955]: E0508 00:53:33.466737 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466779 kubelet[1955]: W0508 00:53:33.466747 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466779 kubelet[1955]: E0508 00:53:33.466755 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.466896 kubelet[1955]: E0508 00:53:33.466885 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.466896 kubelet[1955]: W0508 00:53:33.466895 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.466954 kubelet[1955]: E0508 00:53:33.466903 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.467033 kubelet[1955]: E0508 00:53:33.467023 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.467060 kubelet[1955]: W0508 00:53:33.467033 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.467060 kubelet[1955]: E0508 00:53:33.467041 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.467177 kubelet[1955]: E0508 00:53:33.467168 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.467203 kubelet[1955]: W0508 00:53:33.467178 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.467203 kubelet[1955]: E0508 00:53:33.467185 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.467330 kubelet[1955]: E0508 00:53:33.467319 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.467330 kubelet[1955]: W0508 00:53:33.467329 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.467380 kubelet[1955]: E0508 00:53:33.467337 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.467474 kubelet[1955]: E0508 00:53:33.467464 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.467503 kubelet[1955]: W0508 00:53:33.467475 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.467503 kubelet[1955]: E0508 00:53:33.467482 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.467612 kubelet[1955]: E0508 00:53:33.467603 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.467640 kubelet[1955]: W0508 00:53:33.467612 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.467640 kubelet[1955]: E0508 00:53:33.467619 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.566485 kubelet[1955]: E0508 00:53:33.566441 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.566485 kubelet[1955]: W0508 00:53:33.566462 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.566485 kubelet[1955]: E0508 00:53:33.566477 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.566698 kubelet[1955]: E0508 00:53:33.566672 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.566698 kubelet[1955]: W0508 00:53:33.566684 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.566698 kubelet[1955]: E0508 00:53:33.566698 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.566932 kubelet[1955]: E0508 00:53:33.566906 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.566932 kubelet[1955]: W0508 00:53:33.566919 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.566932 kubelet[1955]: E0508 00:53:33.566932 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.567242 kubelet[1955]: E0508 00:53:33.567216 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.567242 kubelet[1955]: W0508 00:53:33.567229 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.567332 kubelet[1955]: E0508 00:53:33.567248 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.567453 kubelet[1955]: E0508 00:53:33.567439 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.567481 kubelet[1955]: W0508 00:53:33.567453 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.567481 kubelet[1955]: E0508 00:53:33.567466 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.567612 kubelet[1955]: E0508 00:53:33.567601 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.567612 kubelet[1955]: W0508 00:53:33.567611 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.567659 kubelet[1955]: E0508 00:53:33.567627 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.567920 kubelet[1955]: E0508 00:53:33.567905 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.567920 kubelet[1955]: W0508 00:53:33.567917 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.567997 kubelet[1955]: E0508 00:53:33.567971 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.568080 kubelet[1955]: E0508 00:53:33.568069 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.568080 kubelet[1955]: W0508 00:53:33.568080 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.568138 kubelet[1955]: E0508 00:53:33.568105 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.568249 kubelet[1955]: E0508 00:53:33.568239 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.568249 kubelet[1955]: W0508 00:53:33.568248 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.568296 kubelet[1955]: E0508 00:53:33.568260 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.568442 kubelet[1955]: E0508 00:53:33.568430 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.568442 kubelet[1955]: W0508 00:53:33.568440 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.568504 kubelet[1955]: E0508 00:53:33.568455 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.568657 kubelet[1955]: E0508 00:53:33.568645 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.568657 kubelet[1955]: W0508 00:53:33.568656 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.568712 kubelet[1955]: E0508 00:53:33.568667 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.568853 kubelet[1955]: E0508 00:53:33.568841 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.568853 kubelet[1955]: W0508 00:53:33.568851 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.568917 kubelet[1955]: E0508 00:53:33.568866 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569085 kubelet[1955]: E0508 00:53:33.569074 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569085 kubelet[1955]: W0508 00:53:33.569084 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.569150 kubelet[1955]: E0508 00:53:33.569098 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569247 kubelet[1955]: E0508 00:53:33.569236 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569247 kubelet[1955]: W0508 00:53:33.569245 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.569297 kubelet[1955]: E0508 00:53:33.569258 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569435 kubelet[1955]: E0508 00:53:33.569424 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569435 kubelet[1955]: W0508 00:53:33.569435 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.569489 kubelet[1955]: E0508 00:53:33.569458 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569579 kubelet[1955]: E0508 00:53:33.569568 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569579 kubelet[1955]: W0508 00:53:33.569578 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.569626 kubelet[1955]: E0508 00:53:33.569588 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569769 kubelet[1955]: E0508 00:53:33.569755 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569805 kubelet[1955]: W0508 00:53:33.569769 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.569805 kubelet[1955]: E0508 00:53:33.569784 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:33.569970 kubelet[1955]: E0508 00:53:33.569957 1955 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:53:33.569970 kubelet[1955]: W0508 00:53:33.569968 1955 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:53:33.570031 kubelet[1955]: E0508 00:53:33.569976 1955 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:53:34.018111 env[1219]: time="2025-05-08T00:53:34.018063042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:34.019320 env[1219]: time="2025-05-08T00:53:34.019294134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:34.020912 env[1219]: time="2025-05-08T00:53:34.020883942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:34.023988 env[1219]: time="2025-05-08T00:53:34.023944785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:34.024486 env[1219]: time="2025-05-08T00:53:34.024422352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 8 00:53:34.027199 env[1219]: time="2025-05-08T00:53:34.027161896Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:53:34.039064 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2041026546.mount: Deactivated successfully. May 8 00:53:34.046783 env[1219]: time="2025-05-08T00:53:34.046741362Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2\"" May 8 00:53:34.047166 env[1219]: time="2025-05-08T00:53:34.047128290Z" level=info msg="StartContainer for \"c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2\"" May 8 00:53:34.071199 systemd[1]: Started cri-containerd-c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2.scope. May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2480 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:34.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376431386630373833356262303038323035373139303863326137 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit: BPF prog-id=127 op=LOAD May 8 00:53:34.096000 audit[2617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2480 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:34.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376431386630373833356262303038323035373139303863326137 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.096000 audit: BPF prog-id=128 op=LOAD May 8 00:53:34.096000 audit[2617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2480 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:34.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376431386630373833356262303038323035373139303863326137 May 8 00:53:34.097000 audit: BPF prog-id=128 op=UNLOAD May 8 00:53:34.097000 audit: BPF prog-id=127 op=UNLOAD May 8 00:53:34.097000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:34.097000 audit: BPF prog-id=129 op=LOAD May 8 00:53:34.097000 audit[2617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2480 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:34.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376431386630373833356262303038323035373139303863326137 May 8 00:53:34.133083 env[1219]: time="2025-05-08T00:53:34.133016628Z" level=info msg="StartContainer for \"c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2\" returns successfully" May 8 00:53:34.138382 systemd[1]: cri-containerd-c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2.scope: Deactivated successfully. May 8 00:53:34.142000 audit: BPF prog-id=129 op=UNLOAD May 8 00:53:34.199122 env[1219]: time="2025-05-08T00:53:34.199076353Z" level=info msg="shim disconnected" id=c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2 May 8 00:53:34.199404 env[1219]: time="2025-05-08T00:53:34.199381805Z" level=warning msg="cleaning up after shim disconnected" id=c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2 namespace=k8s.io May 8 00:53:34.199482 env[1219]: time="2025-05-08T00:53:34.199468283Z" level=info msg="cleaning up dead shim" May 8 00:53:34.206471 env[1219]: time="2025-05-08T00:53:34.206436936Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:53:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2656 runtime=io.containerd.runc.v2\n" May 8 00:53:34.334455 systemd[1]: run-containerd-runc-k8s.io-c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2-runc.P6M4mb.mount: Deactivated successfully. May 8 00:53:34.334543 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c67d18f07835bb00820571908c2a72ec0c54550622ca4e9d0d3b338012dbf0a2-rootfs.mount: Deactivated successfully. May 8 00:53:34.395964 kubelet[1955]: I0508 00:53:34.395926 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:34.396302 kubelet[1955]: E0508 00:53:34.396209 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:34.396768 kubelet[1955]: E0508 00:53:34.396747 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:34.398060 env[1219]: time="2025-05-08T00:53:34.398016936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:53:34.412635 kubelet[1955]: I0508 00:53:34.412281 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-769c98f795-64566" podStartSLOduration=1.909611577 podStartE2EDuration="3.412264897s" podCreationTimestamp="2025-05-08 00:53:31 +0000 UTC" firstStartedPulling="2025-05-08 00:53:31.633241513 +0000 UTC m=+14.365993464" lastFinishedPulling="2025-05-08 00:53:33.135894873 +0000 UTC m=+15.868646784" observedRunningTime="2025-05-08 00:53:33.402335589 +0000 UTC m=+16.135087620" watchObservedRunningTime="2025-05-08 00:53:34.412264897 +0000 UTC m=+17.145016848" May 8 00:53:35.332586 kubelet[1955]: E0508 00:53:35.331576 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:37.331078 kubelet[1955]: E0508 00:53:37.331029 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:38.050705 env[1219]: time="2025-05-08T00:53:38.050661791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.052386 env[1219]: time="2025-05-08T00:53:38.052337716Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.084856 env[1219]: time="2025-05-08T00:53:38.084803672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.134031 env[1219]: time="2025-05-08T00:53:38.133986980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:38.134626 env[1219]: time="2025-05-08T00:53:38.134597840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 8 00:53:38.138856 env[1219]: time="2025-05-08T00:53:38.138816242Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:53:38.151684 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1876847968.mount: Deactivated successfully. May 8 00:53:38.155894 env[1219]: time="2025-05-08T00:53:38.155801571Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f\"" May 8 00:53:38.156269 env[1219]: time="2025-05-08T00:53:38.156179828Z" level=info msg="StartContainer for \"3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f\"" May 8 00:53:38.178614 systemd[1]: Started cri-containerd-3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f.scope. May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.216330 kernel: kauditd_printk_skb: 223 callbacks suppressed May 8 00:53:38.216402 kernel: audit: type=1400 audit(1746665618.214:987): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2480 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.222369 kernel: audit: type=1300 audit(1746665618.214:987): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2480 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.222423 kernel: audit: type=1327 audit(1746665618.214:987): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393938343231363865646237653139353831643438393833363232 May 8 00:53:38.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393938343231363865646237653139353831643438393833363232 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.227914 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.227956 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.232932 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.235310 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.235367 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.240017 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.240045 kernel: audit: type=1400 audit(1746665618.214:988): avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.214000 audit: BPF prog-id=130 op=LOAD May 8 00:53:38.214000 audit[2681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2480 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393938343231363865646237653139353831643438393833363232 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.215000 audit: BPF prog-id=131 op=LOAD May 8 00:53:38.215000 audit[2681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2480 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393938343231363865646237653139353831643438393833363232 May 8 00:53:38.218000 audit: BPF prog-id=131 op=UNLOAD May 8 00:53:38.218000 audit: BPF prog-id=130 op=UNLOAD May 8 00:53:38.218000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:38.218000 audit: BPF prog-id=132 op=LOAD May 8 00:53:38.218000 audit[2681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2480 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:38.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393938343231363865646237653139353831643438393833363232 May 8 00:53:38.245370 env[1219]: time="2025-05-08T00:53:38.245336120Z" level=info msg="StartContainer for \"3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f\" returns successfully" May 8 00:53:38.435033 kubelet[1955]: E0508 00:53:38.434914 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:38.782993 env[1219]: time="2025-05-08T00:53:38.782935275Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:53:38.785228 systemd[1]: cri-containerd-3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f.scope: Deactivated successfully. May 8 00:53:38.789000 audit: BPF prog-id=132 op=UNLOAD May 8 00:53:38.801106 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f-rootfs.mount: Deactivated successfully. May 8 00:53:38.807479 env[1219]: time="2025-05-08T00:53:38.807425832Z" level=info msg="shim disconnected" id=3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f May 8 00:53:38.807479 env[1219]: time="2025-05-08T00:53:38.807477331Z" level=warning msg="cleaning up after shim disconnected" id=3b99842168edb7e19581d48983622b86848220e52a432b5f8c89ec13b8301f1f namespace=k8s.io May 8 00:53:38.807617 env[1219]: time="2025-05-08T00:53:38.807488095Z" level=info msg="cleaning up dead shim" May 8 00:53:38.814226 env[1219]: time="2025-05-08T00:53:38.814182870Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:53:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2723 runtime=io.containerd.runc.v2\n" May 8 00:53:38.870337 kubelet[1955]: I0508 00:53:38.869575 1955 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 8 00:53:38.903822 systemd[1]: Created slice kubepods-burstable-pod25c7ff6e_341a_4235_8805_abda8ab8a7c8.slice. May 8 00:53:38.908901 systemd[1]: Created slice kubepods-besteffort-pod97197ff1_e864_48de_b3d3_d882cda2a97f.slice. May 8 00:53:38.913932 systemd[1]: Created slice kubepods-besteffort-podfdf92870_cefa_4485_a6de_9c7e16d2b0d2.slice. May 8 00:53:38.918646 systemd[1]: Created slice kubepods-burstable-pod803dfaf5_ed95_4afa_bd92_f764f51ebe32.slice. May 8 00:53:38.922676 systemd[1]: Created slice kubepods-besteffort-pod545892ca_5c8d_4a5b_a50b_fc5743c8a4df.slice. May 8 00:53:39.008719 kubelet[1955]: I0508 00:53:39.008675 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/803dfaf5-ed95-4afa-bd92-f764f51ebe32-config-volume\") pod \"coredns-6f6b679f8f-tpmsp\" (UID: \"803dfaf5-ed95-4afa-bd92-f764f51ebe32\") " pod="kube-system/coredns-6f6b679f8f-tpmsp" May 8 00:53:39.008896 kubelet[1955]: I0508 00:53:39.008730 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n4ncv\" (UniqueName: \"kubernetes.io/projected/545892ca-5c8d-4a5b-a50b-fc5743c8a4df-kube-api-access-n4ncv\") pod \"calico-apiserver-5cf85bd5f9-6g6hv\" (UID: \"545892ca-5c8d-4a5b-a50b-fc5743c8a4df\") " pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" May 8 00:53:39.008896 kubelet[1955]: I0508 00:53:39.008756 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/25c7ff6e-341a-4235-8805-abda8ab8a7c8-config-volume\") pod \"coredns-6f6b679f8f-2n5j2\" (UID: \"25c7ff6e-341a-4235-8805-abda8ab8a7c8\") " pod="kube-system/coredns-6f6b679f8f-2n5j2" May 8 00:53:39.008896 kubelet[1955]: I0508 00:53:39.008775 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/545892ca-5c8d-4a5b-a50b-fc5743c8a4df-calico-apiserver-certs\") pod \"calico-apiserver-5cf85bd5f9-6g6hv\" (UID: \"545892ca-5c8d-4a5b-a50b-fc5743c8a4df\") " pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" May 8 00:53:39.008896 kubelet[1955]: I0508 00:53:39.008806 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/97197ff1-e864-48de-b3d3-d882cda2a97f-calico-apiserver-certs\") pod \"calico-apiserver-5cf85bd5f9-rb2f5\" (UID: \"97197ff1-e864-48de-b3d3-d882cda2a97f\") " pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" May 8 00:53:39.008896 kubelet[1955]: I0508 00:53:39.008823 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gcnj4\" (UniqueName: \"kubernetes.io/projected/97197ff1-e864-48de-b3d3-d882cda2a97f-kube-api-access-gcnj4\") pod \"calico-apiserver-5cf85bd5f9-rb2f5\" (UID: \"97197ff1-e864-48de-b3d3-d882cda2a97f\") " pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" May 8 00:53:39.009028 kubelet[1955]: I0508 00:53:39.008860 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcq48\" (UniqueName: \"kubernetes.io/projected/fdf92870-cefa-4485-a6de-9c7e16d2b0d2-kube-api-access-zcq48\") pod \"calico-kube-controllers-67d5cd68b9-z7snx\" (UID: \"fdf92870-cefa-4485-a6de-9c7e16d2b0d2\") " pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" May 8 00:53:39.009028 kubelet[1955]: I0508 00:53:39.008883 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrgmm\" (UniqueName: \"kubernetes.io/projected/25c7ff6e-341a-4235-8805-abda8ab8a7c8-kube-api-access-vrgmm\") pod \"coredns-6f6b679f8f-2n5j2\" (UID: \"25c7ff6e-341a-4235-8805-abda8ab8a7c8\") " pod="kube-system/coredns-6f6b679f8f-2n5j2" May 8 00:53:39.009028 kubelet[1955]: I0508 00:53:39.008899 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fdf92870-cefa-4485-a6de-9c7e16d2b0d2-tigera-ca-bundle\") pod \"calico-kube-controllers-67d5cd68b9-z7snx\" (UID: \"fdf92870-cefa-4485-a6de-9c7e16d2b0d2\") " pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" May 8 00:53:39.009028 kubelet[1955]: I0508 00:53:39.008917 1955 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8279r\" (UniqueName: \"kubernetes.io/projected/803dfaf5-ed95-4afa-bd92-f764f51ebe32-kube-api-access-8279r\") pod \"coredns-6f6b679f8f-tpmsp\" (UID: \"803dfaf5-ed95-4afa-bd92-f764f51ebe32\") " pod="kube-system/coredns-6f6b679f8f-tpmsp" May 8 00:53:39.208176 kubelet[1955]: E0508 00:53:39.207511 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:39.208952 env[1219]: time="2025-05-08T00:53:39.208551441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2n5j2,Uid:25c7ff6e-341a-4235-8805-abda8ab8a7c8,Namespace:kube-system,Attempt:0,}" May 8 00:53:39.212455 env[1219]: time="2025-05-08T00:53:39.212373242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-rb2f5,Uid:97197ff1-e864-48de-b3d3-d882cda2a97f,Namespace:calico-apiserver,Attempt:0,}" May 8 00:53:39.216381 env[1219]: time="2025-05-08T00:53:39.216329049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-67d5cd68b9-z7snx,Uid:fdf92870-cefa-4485-a6de-9c7e16d2b0d2,Namespace:calico-system,Attempt:0,}" May 8 00:53:39.223867 kubelet[1955]: E0508 00:53:39.221868 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:39.226655 env[1219]: time="2025-05-08T00:53:39.226618806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-6g6hv,Uid:545892ca-5c8d-4a5b-a50b-fc5743c8a4df,Namespace:calico-apiserver,Attempt:0,}" May 8 00:53:39.227119 env[1219]: time="2025-05-08T00:53:39.227050795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tpmsp,Uid:803dfaf5-ed95-4afa-bd92-f764f51ebe32,Namespace:kube-system,Attempt:0,}" May 8 00:53:39.336464 systemd[1]: Created slice kubepods-besteffort-podf0773fa0_2f79_4143_a60d_2de26f98e45d.slice. May 8 00:53:39.338544 env[1219]: time="2025-05-08T00:53:39.338505241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxxq,Uid:f0773fa0-2f79-4143-a60d-2de26f98e45d,Namespace:calico-system,Attempt:0,}" May 8 00:53:39.411058 kubelet[1955]: E0508 00:53:39.410921 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:39.416797 env[1219]: time="2025-05-08T00:53:39.415478529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:53:39.421160 env[1219]: time="2025-05-08T00:53:39.421080025Z" level=error msg="Failed to destroy network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.421925 env[1219]: time="2025-05-08T00:53:39.421873219Z" level=error msg="encountered an error cleaning up failed sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.422008 env[1219]: time="2025-05-08T00:53:39.421940362Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-6g6hv,Uid:545892ca-5c8d-4a5b-a50b-fc5743c8a4df,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.423882 kubelet[1955]: E0508 00:53:39.423129 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.423882 kubelet[1955]: E0508 00:53:39.423215 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" May 8 00:53:39.423882 kubelet[1955]: E0508 00:53:39.423236 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" May 8 00:53:39.424039 kubelet[1955]: E0508 00:53:39.423277 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cf85bd5f9-6g6hv_calico-apiserver(545892ca-5c8d-4a5b-a50b-fc5743c8a4df)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cf85bd5f9-6g6hv_calico-apiserver(545892ca-5c8d-4a5b-a50b-fc5743c8a4df)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" podUID="545892ca-5c8d-4a5b-a50b-fc5743c8a4df" May 8 00:53:39.428485 env[1219]: time="2025-05-08T00:53:39.428444811Z" level=error msg="Failed to destroy network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.429055 env[1219]: time="2025-05-08T00:53:39.429018769Z" level=error msg="encountered an error cleaning up failed sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.429129 env[1219]: time="2025-05-08T00:53:39.429075269Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tpmsp,Uid:803dfaf5-ed95-4afa-bd92-f764f51ebe32,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.429455 kubelet[1955]: E0508 00:53:39.429252 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.429455 kubelet[1955]: E0508 00:53:39.429300 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tpmsp" May 8 00:53:39.429455 kubelet[1955]: E0508 00:53:39.429316 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tpmsp" May 8 00:53:39.429638 kubelet[1955]: E0508 00:53:39.429353 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-tpmsp_kube-system(803dfaf5-ed95-4afa-bd92-f764f51ebe32)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-tpmsp_kube-system(803dfaf5-ed95-4afa-bd92-f764f51ebe32)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tpmsp" podUID="803dfaf5-ed95-4afa-bd92-f764f51ebe32" May 8 00:53:39.438686 env[1219]: time="2025-05-08T00:53:39.438620568Z" level=error msg="Failed to destroy network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.439007 env[1219]: time="2025-05-08T00:53:39.438968488Z" level=error msg="encountered an error cleaning up failed sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.439071 env[1219]: time="2025-05-08T00:53:39.439021547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2n5j2,Uid:25c7ff6e-341a-4235-8805-abda8ab8a7c8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.439499 kubelet[1955]: E0508 00:53:39.439197 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.439499 kubelet[1955]: E0508 00:53:39.439250 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-2n5j2" May 8 00:53:39.439499 kubelet[1955]: E0508 00:53:39.439271 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-2n5j2" May 8 00:53:39.439845 kubelet[1955]: E0508 00:53:39.439301 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-2n5j2_kube-system(25c7ff6e-341a-4235-8805-abda8ab8a7c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-2n5j2_kube-system(25c7ff6e-341a-4235-8805-abda8ab8a7c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-2n5j2" podUID="25c7ff6e-341a-4235-8805-abda8ab8a7c8" May 8 00:53:39.446798 env[1219]: time="2025-05-08T00:53:39.446749218Z" level=error msg="Failed to destroy network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.447149 env[1219]: time="2025-05-08T00:53:39.447114184Z" level=error msg="encountered an error cleaning up failed sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.447196 env[1219]: time="2025-05-08T00:53:39.447165202Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-67d5cd68b9-z7snx,Uid:fdf92870-cefa-4485-a6de-9c7e16d2b0d2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.447600 kubelet[1955]: E0508 00:53:39.447329 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.447600 kubelet[1955]: E0508 00:53:39.447366 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" May 8 00:53:39.447600 kubelet[1955]: E0508 00:53:39.447385 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" May 8 00:53:39.447930 kubelet[1955]: E0508 00:53:39.447414 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-67d5cd68b9-z7snx_calico-system(fdf92870-cefa-4485-a6de-9c7e16d2b0d2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-67d5cd68b9-z7snx_calico-system(fdf92870-cefa-4485-a6de-9c7e16d2b0d2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" podUID="fdf92870-cefa-4485-a6de-9c7e16d2b0d2" May 8 00:53:39.448731 env[1219]: time="2025-05-08T00:53:39.448690569Z" level=error msg="Failed to destroy network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.449017 env[1219]: time="2025-05-08T00:53:39.448984551Z" level=error msg="encountered an error cleaning up failed sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.449071 env[1219]: time="2025-05-08T00:53:39.449028286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-rb2f5,Uid:97197ff1-e864-48de-b3d3-d882cda2a97f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.449315 kubelet[1955]: E0508 00:53:39.449198 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.449315 kubelet[1955]: E0508 00:53:39.449233 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" May 8 00:53:39.449315 kubelet[1955]: E0508 00:53:39.449248 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" May 8 00:53:39.449654 kubelet[1955]: E0508 00:53:39.449277 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cf85bd5f9-rb2f5_calico-apiserver(97197ff1-e864-48de-b3d3-d882cda2a97f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cf85bd5f9-rb2f5_calico-apiserver(97197ff1-e864-48de-b3d3-d882cda2a97f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" podUID="97197ff1-e864-48de-b3d3-d882cda2a97f" May 8 00:53:39.453977 env[1219]: time="2025-05-08T00:53:39.453933421Z" level=error msg="Failed to destroy network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.454254 env[1219]: time="2025-05-08T00:53:39.454216999Z" level=error msg="encountered an error cleaning up failed sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.454293 env[1219]: time="2025-05-08T00:53:39.454260494Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxxq,Uid:f0773fa0-2f79-4143-a60d-2de26f98e45d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.454639 kubelet[1955]: E0508 00:53:39.454392 1955 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:39.454639 kubelet[1955]: E0508 00:53:39.454424 1955 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:39.454639 kubelet[1955]: E0508 00:53:39.454438 1955 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttxxq" May 8 00:53:39.454769 kubelet[1955]: E0508 00:53:39.454471 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ttxxq_calico-system(f0773fa0-2f79-4143-a60d-2de26f98e45d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ttxxq_calico-system(f0773fa0-2f79-4143-a60d-2de26f98e45d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:40.150928 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da-shm.mount: Deactivated successfully. May 8 00:53:40.151019 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571-shm.mount: Deactivated successfully. May 8 00:53:40.151066 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f-shm.mount: Deactivated successfully. May 8 00:53:40.415157 kubelet[1955]: I0508 00:53:40.414851 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:40.416830 env[1219]: time="2025-05-08T00:53:40.415546677Z" level=info msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" May 8 00:53:40.418343 kubelet[1955]: I0508 00:53:40.418311 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:40.419978 env[1219]: time="2025-05-08T00:53:40.418940121Z" level=info msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" May 8 00:53:40.420439 kubelet[1955]: I0508 00:53:40.420394 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:40.421131 env[1219]: time="2025-05-08T00:53:40.420911255Z" level=info msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" May 8 00:53:40.422395 kubelet[1955]: I0508 00:53:40.422363 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:40.422850 env[1219]: time="2025-05-08T00:53:40.422690765Z" level=info msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" May 8 00:53:40.426560 kubelet[1955]: I0508 00:53:40.426530 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:40.427859 env[1219]: time="2025-05-08T00:53:40.427144681Z" level=info msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" May 8 00:53:40.441900 kubelet[1955]: I0508 00:53:40.441873 1955 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:40.446455 env[1219]: time="2025-05-08T00:53:40.446417708Z" level=info msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" May 8 00:53:40.497373 env[1219]: time="2025-05-08T00:53:40.497313057Z" level=error msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" failed" error="failed to destroy network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.498546 kubelet[1955]: E0508 00:53:40.497941 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:40.498546 kubelet[1955]: E0508 00:53:40.498003 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff"} May 8 00:53:40.498546 kubelet[1955]: E0508 00:53:40.498074 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0773fa0-2f79-4143-a60d-2de26f98e45d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.498546 kubelet[1955]: E0508 00:53:40.498095 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0773fa0-2f79-4143-a60d-2de26f98e45d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttxxq" podUID="f0773fa0-2f79-4143-a60d-2de26f98e45d" May 8 00:53:40.501867 env[1219]: time="2025-05-08T00:53:40.501804465Z" level=error msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" failed" error="failed to destroy network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.503666 kubelet[1955]: E0508 00:53:40.502057 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:40.503666 kubelet[1955]: E0508 00:53:40.502111 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f"} May 8 00:53:40.503666 kubelet[1955]: E0508 00:53:40.502149 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25c7ff6e-341a-4235-8805-abda8ab8a7c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.503666 kubelet[1955]: E0508 00:53:40.502169 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25c7ff6e-341a-4235-8805-abda8ab8a7c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-2n5j2" podUID="25c7ff6e-341a-4235-8805-abda8ab8a7c8" May 8 00:53:40.505380 env[1219]: time="2025-05-08T00:53:40.504954789Z" level=error msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" failed" error="failed to destroy network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.505520 kubelet[1955]: E0508 00:53:40.505173 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:40.505520 kubelet[1955]: E0508 00:53:40.505213 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da"} May 8 00:53:40.505520 kubelet[1955]: E0508 00:53:40.505251 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fdf92870-cefa-4485-a6de-9c7e16d2b0d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.505520 kubelet[1955]: E0508 00:53:40.505274 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fdf92870-cefa-4485-a6de-9c7e16d2b0d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" podUID="fdf92870-cefa-4485-a6de-9c7e16d2b0d2" May 8 00:53:40.527356 env[1219]: time="2025-05-08T00:53:40.527156868Z" level=error msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" failed" error="failed to destroy network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.528255 kubelet[1955]: E0508 00:53:40.528104 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:40.528255 kubelet[1955]: E0508 00:53:40.528154 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9"} May 8 00:53:40.528255 kubelet[1955]: E0508 00:53:40.528197 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"545892ca-5c8d-4a5b-a50b-fc5743c8a4df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.528255 kubelet[1955]: E0508 00:53:40.528218 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"545892ca-5c8d-4a5b-a50b-fc5743c8a4df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" podUID="545892ca-5c8d-4a5b-a50b-fc5743c8a4df" May 8 00:53:40.529476 env[1219]: time="2025-05-08T00:53:40.529430622Z" level=error msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" failed" error="failed to destroy network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.529798 kubelet[1955]: E0508 00:53:40.529683 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:40.529798 kubelet[1955]: E0508 00:53:40.529723 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04"} May 8 00:53:40.529798 kubelet[1955]: E0508 00:53:40.529750 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"803dfaf5-ed95-4afa-bd92-f764f51ebe32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.529798 kubelet[1955]: E0508 00:53:40.529768 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"803dfaf5-ed95-4afa-bd92-f764f51ebe32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tpmsp" podUID="803dfaf5-ed95-4afa-bd92-f764f51ebe32" May 8 00:53:40.536385 env[1219]: time="2025-05-08T00:53:40.536324146Z" level=error msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" failed" error="failed to destroy network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:53:40.536637 kubelet[1955]: E0508 00:53:40.536581 1955 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:40.536691 kubelet[1955]: E0508 00:53:40.536638 1955 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571"} May 8 00:53:40.536691 kubelet[1955]: E0508 00:53:40.536667 1955 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"97197ff1-e864-48de-b3d3-d882cda2a97f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:53:40.536880 kubelet[1955]: E0508 00:53:40.536702 1955 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"97197ff1-e864-48de-b3d3-d882cda2a97f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" podUID="97197ff1-e864-48de-b3d3-d882cda2a97f" May 8 00:53:41.839588 kubelet[1955]: I0508 00:53:41.839447 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:41.840021 kubelet[1955]: E0508 00:53:41.839791 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:41.866000 audit[3111]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.866000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd44dff50 a2=0 a3=1 items=0 ppid=2106 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:41.875000 audit[3111]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:41.875000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd44dff50 a2=0 a3=1 items=0 ppid=2106 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:41.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:42.445012 kubelet[1955]: E0508 00:53:42.444973 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:43.448188 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2208932571.mount: Deactivated successfully. May 8 00:53:43.785877 env[1219]: time="2025-05-08T00:53:43.785147834Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.786683 env[1219]: time="2025-05-08T00:53:43.786654277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.790104 env[1219]: time="2025-05-08T00:53:43.790063398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.796404 env[1219]: time="2025-05-08T00:53:43.796368171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:43.796680 env[1219]: time="2025-05-08T00:53:43.796653615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 8 00:53:43.815639 env[1219]: time="2025-05-08T00:53:43.815574455Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:53:43.833179 env[1219]: time="2025-05-08T00:53:43.833123611Z" level=info msg="CreateContainer within sandbox \"0568ca0cd1e979433748e1c5b8643c56a294dd186823347e3afcae9328060421\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"43362875a04a491c3e0a5092e6ed42c01a824eb75e3753c730815faa95f1c971\"" May 8 00:53:43.833808 env[1219]: time="2025-05-08T00:53:43.833783365Z" level=info msg="StartContainer for \"43362875a04a491c3e0a5092e6ed42c01a824eb75e3753c730815faa95f1c971\"" May 8 00:53:43.850203 systemd[1]: Started cri-containerd-43362875a04a491c3e0a5092e6ed42c01a824eb75e3753c730815faa95f1c971.scope. May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890859 kernel: kauditd_printk_skb: 40 callbacks suppressed May 8 00:53:43.890919 kernel: audit: type=1400 audit(1746665623.889:996): avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2480 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.896627 kernel: audit: type=1300 audit(1746665623.889:996): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2480 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433333632383735613034613439316333653061353039326536656434 May 8 00:53:43.899850 kernel: audit: type=1327 audit(1746665623.889:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433333632383735613034613439316333653061353039326536656434 May 8 00:53:43.899901 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.904407 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.905870 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.909905 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.914416 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.914484 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.917861 kernel: audit: type=1400 audit(1746665623.889:997): avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.889000 audit: BPF prog-id=133 op=LOAD May 8 00:53:43.889000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2480 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433333632383735613034613439316333653061353039326536656434 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.890000 audit: BPF prog-id=134 op=LOAD May 8 00:53:43.890000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2480 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433333632383735613034613439316333653061353039326536656434 May 8 00:53:43.892000 audit: BPF prog-id=134 op=UNLOAD May 8 00:53:43.892000 audit: BPF prog-id=133 op=UNLOAD May 8 00:53:43.892000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:43.892000 audit: BPF prog-id=135 op=LOAD May 8 00:53:43.892000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2480 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:43.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433333632383735613034613439316333653061353039326536656434 May 8 00:53:43.952048 env[1219]: time="2025-05-08T00:53:43.951996981Z" level=info msg="StartContainer for \"43362875a04a491c3e0a5092e6ed42c01a824eb75e3753c730815faa95f1c971\" returns successfully" May 8 00:53:44.014083 systemd[1]: Started sshd@7-10.0.0.136:22-10.0.0.1:41514.service. May 8 00:53:44.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:41514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:44.075000 audit[3157]: USER_ACCT pid=3157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.076680 sshd[3157]: Accepted publickey for core from 10.0.0.1 port 41514 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:44.077000 audit[3157]: CRED_ACQ pid=3157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.077000 audit[3157]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffbc14c30 a2=3 a3=1 items=0 ppid=1 pid=3157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:44.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:44.079026 sshd[3157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:44.082806 systemd-logind[1206]: New session 8 of user core. May 8 00:53:44.083703 systemd[1]: Started session-8.scope. May 8 00:53:44.086000 audit[3157]: USER_START pid=3157 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.087000 audit[3160]: CRED_ACQ pid=3160 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.147904 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:53:44.148101 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:53:44.293979 sshd[3157]: pam_unix(sshd:session): session closed for user core May 8 00:53:44.294000 audit[3157]: USER_END pid=3157 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.294000 audit[3157]: CRED_DISP pid=3157 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:44.297662 systemd[1]: sshd@7-10.0.0.136:22-10.0.0.1:41514.service: Deactivated successfully. May 8 00:53:44.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:41514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:44.298399 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:53:44.299057 systemd-logind[1206]: Session 8 logged out. Waiting for processes to exit. May 8 00:53:44.299824 systemd-logind[1206]: Removed session 8. May 8 00:53:44.452503 kubelet[1955]: E0508 00:53:44.452403 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:44.466647 kubelet[1955]: I0508 00:53:44.466593 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mnql6" podStartSLOduration=2.356105168 podStartE2EDuration="13.466576865s" podCreationTimestamp="2025-05-08 00:53:31 +0000 UTC" firstStartedPulling="2025-05-08 00:53:32.687322773 +0000 UTC m=+15.420074724" lastFinishedPulling="2025-05-08 00:53:43.79779447 +0000 UTC m=+26.530546421" observedRunningTime="2025-05-08 00:53:44.466239889 +0000 UTC m=+27.198991840" watchObservedRunningTime="2025-05-08 00:53:44.466576865 +0000 UTC m=+27.199328816" May 8 00:53:45.398000 audit[3263]: AVC avc: denied { write } for pid=3263 comm="tee" name="fd" dev="proc" ino=19687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.398000 audit[3263]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc6155a1e a2=241 a3=1b6 items=1 ppid=3212 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.398000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:53:45.398000 audit: PATH item=0 name="/dev/fd/63" inode=17335 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.400000 audit[3272]: AVC avc: denied { write } for pid=3272 comm="tee" name="fd" dev="proc" ino=19691 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.400000 audit[3272]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6083a30 a2=241 a3=1b6 items=1 ppid=3211 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.400000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:53:45.400000 audit: PATH item=0 name="/dev/fd/63" inode=18164 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.400000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.409000 audit[3268]: AVC avc: denied { write } for pid=3268 comm="tee" name="fd" dev="proc" ino=18954 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.409000 audit[3268]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5bdea1f a2=241 a3=1b6 items=1 ppid=3218 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.409000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:53:45.409000 audit: PATH item=0 name="/dev/fd/63" inode=18949 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.409000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.413000 audit[3280]: AVC avc: denied { write } for pid=3280 comm="tee" name="fd" dev="proc" ino=18959 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.413000 audit[3280]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe329ea2e a2=241 a3=1b6 items=1 ppid=3224 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.413000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:53:45.413000 audit: PATH item=0 name="/dev/fd/63" inode=17344 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.417000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=17350 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.417000 audit[3286]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdebfda2e a2=241 a3=1b6 items=1 ppid=3216 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.417000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:53:45.417000 audit: PATH item=0 name="/dev/fd/63" inode=18167 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.417000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.420000 audit[3283]: AVC avc: denied { write } for pid=3283 comm="tee" name="fd" dev="proc" ino=18963 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.420000 audit[3283]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc74fa2f a2=241 a3=1b6 items=1 ppid=3220 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.420000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:53:45.420000 audit: PATH item=0 name="/dev/fd/63" inode=17345 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.420000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.432000 audit[3289]: AVC avc: denied { write } for pid=3289 comm="tee" name="fd" dev="proc" ino=17355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:53:45.432000 audit[3289]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf384a2e a2=241 a3=1b6 items=1 ppid=3214 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.432000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:53:45.432000 audit: PATH item=0 name="/dev/fd/63" inode=18956 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:53:45.432000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:53:45.453950 kubelet[1955]: I0508 00:53:45.453921 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:45.454309 kubelet[1955]: E0508 00:53:45.454283 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit: BPF prog-id=136 op=LOAD May 8 00:53:45.550000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1739378 a2=98 a3=ffffd1739368 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.550000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.550000 audit: BPF prog-id=136 op=UNLOAD May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit: BPF prog-id=137 op=LOAD May 8 00:53:45.550000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1739008 a2=74 a3=95 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.550000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.550000 audit: BPF prog-id=137 op=UNLOAD May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.550000 audit: BPF prog-id=138 op=LOAD May 8 00:53:45.550000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1739068 a2=94 a3=2 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.550000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.550000 audit: BPF prog-id=138 op=UNLOAD May 8 00:53:45.640000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit: BPF prog-id=139 op=LOAD May 8 00:53:45.640000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1739028 a2=40 a3=ffffd1739058 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.640000 audit: BPF prog-id=139 op=UNLOAD May 8 00:53:45.640000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.640000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd1739140 a2=50 a3=0 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.648000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.648000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1739098 a2=28 a3=ffffd17391c8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.648000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.648000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd17390c8 a2=28 a3=ffffd17391f8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.648000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.648000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1738f78 a2=28 a3=ffffd17390a8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd17390e8 a2=28 a3=ffffd1739218 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd17390c8 a2=28 a3=ffffd17391f8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd17390b8 a2=28 a3=ffffd17391e8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd17390e8 a2=28 a3=ffffd1739218 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd17390c8 a2=28 a3=ffffd17391f8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd17390e8 a2=28 a3=ffffd1739218 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd17390b8 a2=28 a3=ffffd17391e8 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1739138 a2=28 a3=ffffd1739278 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd1738e70 a2=50 a3=0 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit: BPF prog-id=140 op=LOAD May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd1738e78 a2=94 a3=5 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit: BPF prog-id=140 op=UNLOAD May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd1738f80 a2=50 a3=0 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd17390c8 a2=4 a3=3 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd17390a8 a2=94 a3=6 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd1738878 a2=94 a3=83 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.649000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.649000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd1738878 a2=94 a3=83 items=0 ppid=3217 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.649000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit: BPF prog-id=141 op=LOAD May 8 00:53:45.661000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe83bc038 a2=98 a3=ffffe83bc028 items=0 ppid=3217 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.661000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:53:45.661000 audit: BPF prog-id=141 op=UNLOAD May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit: BPF prog-id=142 op=LOAD May 8 00:53:45.661000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe83bbee8 a2=74 a3=95 items=0 ppid=3217 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.661000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:53:45.661000 audit: BPF prog-id=142 op=UNLOAD May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.661000 audit: BPF prog-id=143 op=LOAD May 8 00:53:45.661000 audit[3336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe83bbf18 a2=40 a3=ffffe83bbf48 items=0 ppid=3217 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.661000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:53:45.661000 audit: BPF prog-id=143 op=UNLOAD May 8 00:53:45.708271 systemd-networkd[1044]: vxlan.calico: Link UP May 8 00:53:45.708284 systemd-networkd[1044]: vxlan.calico: Gained carrier May 8 00:53:45.724000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.724000 audit: BPF prog-id=144 op=LOAD May 8 00:53:45.724000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda91ca08 a2=98 a3=ffffda91c9f8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.724000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit: BPF prog-id=144 op=UNLOAD May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit: BPF prog-id=145 op=LOAD May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda91c6e8 a2=74 a3=95 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit: BPF prog-id=145 op=UNLOAD May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit: BPF prog-id=146 op=LOAD May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda91c748 a2=94 a3=2 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit: BPF prog-id=146 op=UNLOAD May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c778 a2=28 a3=ffffda91c8a8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda91c7a8 a2=28 a3=ffffda91c8d8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda91c658 a2=28 a3=ffffda91c788 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c7c8 a2=28 a3=ffffda91c8f8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c7a8 a2=28 a3=ffffda91c8d8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c798 a2=28 a3=ffffda91c8c8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c7c8 a2=28 a3=ffffda91c8f8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda91c7a8 a2=28 a3=ffffda91c8d8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda91c7c8 a2=28 a3=ffffda91c8f8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda91c798 a2=28 a3=ffffda91c8c8 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffda91c818 a2=28 a3=ffffda91c958 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.725000 audit: BPF prog-id=147 op=LOAD May 8 00:53:45.725000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffda91c638 a2=40 a3=ffffda91c668 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.725000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.725000 audit: BPF prog-id=147 op=UNLOAD May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffda91c660 a2=50 a3=0 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffda91c660 a2=50 a3=0 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit: BPF prog-id=148 op=LOAD May 8 00:53:45.726000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffda91bdc8 a2=94 a3=2 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.726000 audit: BPF prog-id=148 op=UNLOAD May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.726000 audit: BPF prog-id=149 op=LOAD May 8 00:53:45.726000 audit[3365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffda91bf58 a2=94 a3=30 items=0 ppid=3217 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit: BPF prog-id=150 op=LOAD May 8 00:53:45.735000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd4c48d48 a2=98 a3=ffffd4c48d38 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.735000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.735000 audit: BPF prog-id=150 op=UNLOAD May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit: BPF prog-id=151 op=LOAD May 8 00:53:45.735000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4c489d8 a2=74 a3=95 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.735000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.735000 audit: BPF prog-id=151 op=UNLOAD May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.735000 audit: BPF prog-id=152 op=LOAD May 8 00:53:45.735000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4c48a38 a2=94 a3=2 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.735000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.735000 audit: BPF prog-id=152 op=UNLOAD May 8 00:53:45.820000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.820000 audit: BPF prog-id=153 op=LOAD May 8 00:53:45.820000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4c489f8 a2=40 a3=ffffd4c48a28 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.820000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.821000 audit: BPF prog-id=153 op=UNLOAD May 8 00:53:45.821000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.821000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd4c48b10 a2=50 a3=0 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.821000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.830000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.830000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48a68 a2=28 a3=ffffd4c48b98 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.830000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.830000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4c48a98 a2=28 a3=ffffd4c48bc8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.830000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.830000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4c48948 a2=28 a3=ffffd4c48a78 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.830000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.830000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48ab8 a2=28 a3=ffffd4c48be8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48a98 a2=28 a3=ffffd4c48bc8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48a88 a2=28 a3=ffffd4c48bb8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48ab8 a2=28 a3=ffffd4c48be8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4c48a98 a2=28 a3=ffffd4c48bc8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4c48ab8 a2=28 a3=ffffd4c48be8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.831000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.831000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4c48a88 a2=28 a3=ffffd4c48bb8 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4c48b08 a2=28 a3=ffffd4c48c48 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd4c48840 a2=50 a3=0 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.832000 audit: BPF prog-id=154 op=LOAD May 8 00:53:45.832000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd4c48848 a2=94 a3=5 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.833000 audit: BPF prog-id=154 op=UNLOAD May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd4c48950 a2=50 a3=0 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd4c48a98 a2=4 a3=3 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.833000 audit[3374]: AVC avc: denied { confidentiality } for pid=3374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.833000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4c48a78 a2=94 a3=6 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { confidentiality } for pid=3374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.834000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4c48248 a2=94 a3=83 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.834000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.834000 audit[3374]: AVC avc: denied { confidentiality } for pid=3374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:53:45.834000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4c48248 a2=94 a3=83 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.834000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.835000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.835000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4c49c88 a2=10 a3=ffffd4c49d78 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.836000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.836000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4c49b48 a2=10 a3=ffffd4c49c38 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.836000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.836000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4c49ab8 a2=10 a3=ffffd4c49c38 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.836000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:45.836000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4c49ab8 a2=10 a3=ffffd4c49c38 items=0 ppid=3217 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:53:45.846000 audit: BPF prog-id=149 op=UNLOAD May 8 00:53:45.888000 audit[3396]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:45.888000 audit[3396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd819b680 a2=0 a3=ffffb5a64fa8 items=0 ppid=3217 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.888000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:45.894000 audit[3397]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=3397 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:45.894000 audit[3397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff3d9a490 a2=0 a3=ffffb3a26fa8 items=0 ppid=3217 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:45.895000 audit[3400]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:45.895000 audit[3400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe57a9ed0 a2=0 a3=ffffa6f0ffa8 items=0 ppid=3217 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:45.897000 audit[3395]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:45.897000 audit[3395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc258e060 a2=0 a3=ffffa25c5fa8 items=0 ppid=3217 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:45.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:47.229036 systemd-networkd[1044]: vxlan.calico: Gained IPv6LL May 8 00:53:49.301520 systemd[1]: Started sshd@8-10.0.0.136:22-10.0.0.1:41528.service. May 8 00:53:49.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:41528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:49.305496 kernel: kauditd_printk_skb: 559 callbacks suppressed May 8 00:53:49.305660 kernel: audit: type=1130 audit(1746665629.299:1113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:41528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:49.428000 audit[3415]: USER_ACCT pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.430992 sshd[3415]: Accepted publickey for core from 10.0.0.1 port 41528 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:49.432000 audit[3415]: CRED_ACQ pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.434228 sshd[3415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:49.436892 kernel: audit: type=1101 audit(1746665629.428:1114): pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.436939 kernel: audit: type=1103 audit(1746665629.432:1115): pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.438791 kernel: audit: type=1006 audit(1746665629.432:1116): pid=3415 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 8 00:53:49.438866 kernel: audit: type=1300 audit(1746665629.432:1116): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe904e120 a2=3 a3=1 items=0 ppid=1 pid=3415 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:49.432000 audit[3415]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe904e120 a2=3 a3=1 items=0 ppid=1 pid=3415 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:49.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:49.443220 kernel: audit: type=1327 audit(1746665629.432:1116): proctitle=737368643A20636F7265205B707269765D May 8 00:53:49.443336 systemd-logind[1206]: New session 9 of user core. May 8 00:53:49.444007 systemd[1]: Started session-9.scope. May 8 00:53:49.445000 audit[3415]: USER_START pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.446000 audit[3417]: CRED_ACQ pid=3417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.453343 kernel: audit: type=1105 audit(1746665629.445:1117): pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.453400 kernel: audit: type=1103 audit(1746665629.446:1118): pid=3417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.599615 sshd[3415]: pam_unix(sshd:session): session closed for user core May 8 00:53:49.598000 audit[3415]: USER_END pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.602110 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:53:49.602658 systemd[1]: sshd@8-10.0.0.136:22-10.0.0.1:41528.service: Deactivated successfully. May 8 00:53:49.598000 audit[3415]: CRED_DISP pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.604763 systemd-logind[1206]: Session 9 logged out. Waiting for processes to exit. May 8 00:53:49.605506 systemd-logind[1206]: Removed session 9. May 8 00:53:49.607113 kernel: audit: type=1106 audit(1746665629.598:1119): pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.607162 kernel: audit: type=1104 audit(1746665629.598:1120): pid=3415 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:49.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:41528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:49.873518 kubelet[1955]: I0508 00:53:49.873409 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:49.873910 kubelet[1955]: E0508 00:53:49.873892 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:49.896319 systemd[1]: run-containerd-runc-k8s.io-43362875a04a491c3e0a5092e6ed42c01a824eb75e3753c730815faa95f1c971-runc.pN8yqj.mount: Deactivated successfully. May 8 00:53:50.463289 kubelet[1955]: E0508 00:53:50.463261 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:51.331984 env[1219]: time="2025-05-08T00:53:51.331937334Z" level=info msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.397 [INFO][3498] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.397 [INFO][3498] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" iface="eth0" netns="/var/run/netns/cni-08d82102-fe42-bc66-8c49-bc017018755b" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.398 [INFO][3498] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" iface="eth0" netns="/var/run/netns/cni-08d82102-fe42-bc66-8c49-bc017018755b" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.398 [INFO][3498] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" iface="eth0" netns="/var/run/netns/cni-08d82102-fe42-bc66-8c49-bc017018755b" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.398 [INFO][3498] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.398 [INFO][3498] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.459 [INFO][3506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.459 [INFO][3506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.460 [INFO][3506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.469 [WARNING][3506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.469 [INFO][3506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.470 [INFO][3506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:51.473598 env[1219]: 2025-05-08 00:53:51.472 [INFO][3498] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:53:51.474204 env[1219]: time="2025-05-08T00:53:51.473727375Z" level=info msg="TearDown network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" successfully" May 8 00:53:51.474204 env[1219]: time="2025-05-08T00:53:51.473756341Z" level=info msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" returns successfully" May 8 00:53:51.475138 env[1219]: time="2025-05-08T00:53:51.475111884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-rb2f5,Uid:97197ff1-e864-48de-b3d3-d882cda2a97f,Namespace:calico-apiserver,Attempt:1,}" May 8 00:53:51.475624 systemd[1]: run-netns-cni\x2d08d82102\x2dfe42\x2dbc66\x2d8c49\x2dbc017018755b.mount: Deactivated successfully. May 8 00:53:51.596262 systemd-networkd[1044]: calib69b67fda42: Link UP May 8 00:53:51.597908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:53:51.597966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib69b67fda42: link becomes ready May 8 00:53:51.598928 systemd-networkd[1044]: calib69b67fda42: Gained carrier May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.529 [INFO][3514] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0 calico-apiserver-5cf85bd5f9- calico-apiserver 97197ff1-e864-48de-b3d3-d882cda2a97f 812 0 2025-05-08 00:53:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cf85bd5f9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5cf85bd5f9-rb2f5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib69b67fda42 [] []}} ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.529 [INFO][3514] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.557 [INFO][3528] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" HandleID="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.568 [INFO][3528] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" HandleID="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003aa390), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5cf85bd5f9-rb2f5", "timestamp":"2025-05-08 00:53:51.557331928 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.568 [INFO][3528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.568 [INFO][3528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.568 [INFO][3528] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.570 [INFO][3528] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.574 [INFO][3528] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.578 [INFO][3528] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.580 [INFO][3528] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.582 [INFO][3528] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.582 [INFO][3528] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.583 [INFO][3528] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107 May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.586 [INFO][3528] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.591 [INFO][3528] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.591 [INFO][3528] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" host="localhost" May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.591 [INFO][3528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:51.612708 env[1219]: 2025-05-08 00:53:51.591 [INFO][3528] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" HandleID="k8s-pod-network.75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.593 [INFO][3514] cni-plugin/k8s.go 386: Populated endpoint ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"97197ff1-e864-48de-b3d3-d882cda2a97f", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5cf85bd5f9-rb2f5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib69b67fda42", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.593 [INFO][3514] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.593 [INFO][3514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib69b67fda42 ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.599 [INFO][3514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.599 [INFO][3514] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"97197ff1-e864-48de-b3d3-d882cda2a97f", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107", Pod:"calico-apiserver-5cf85bd5f9-rb2f5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib69b67fda42", MAC:"32:fd:d0:0f:0d:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:51.613312 env[1219]: 2025-05-08 00:53:51.609 [INFO][3514] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-rb2f5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:53:51.621000 audit[3546]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:51.621000 audit[3546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23492 a0=3 a1=ffffd1ec83c0 a2=0 a3=ffffb6bc6fa8 items=0 ppid=3217 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.621000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:51.631477 env[1219]: time="2025-05-08T00:53:51.631420640Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:51.631477 env[1219]: time="2025-05-08T00:53:51.631457369Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:51.631477 env[1219]: time="2025-05-08T00:53:51.631467331Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:51.631706 env[1219]: time="2025-05-08T00:53:51.631675457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107 pid=3561 runtime=io.containerd.runc.v2 May 8 00:53:51.643304 systemd[1]: Started cri-containerd-75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107.scope. May 8 00:53:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.673000 audit: BPF prog-id=155 op=LOAD May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3561 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626165663065663038336233353034323765636132653263323065 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3561 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626165663065663038336233353034323765636132653263323065 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit: BPF prog-id=156 op=LOAD May 8 00:53:51.674000 audit[3570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3561 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626165663065663038336233353034323765636132653263323065 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit: BPF prog-id=157 op=LOAD May 8 00:53:51.674000 audit[3570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3561 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626165663065663038336233353034323765636132653263323065 May 8 00:53:51.674000 audit: BPF prog-id=157 op=UNLOAD May 8 00:53:51.674000 audit: BPF prog-id=156 op=UNLOAD May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:51.674000 audit: BPF prog-id=158 op=LOAD May 8 00:53:51.674000 audit[3570]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3561 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:51.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626165663065663038336233353034323765636132653263323065 May 8 00:53:51.677009 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:51.695389 env[1219]: time="2025-05-08T00:53:51.695329164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-rb2f5,Uid:97197ff1-e864-48de-b3d3-d882cda2a97f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107\"" May 8 00:53:51.697898 env[1219]: time="2025-05-08T00:53:51.697654322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:53:52.334548 env[1219]: time="2025-05-08T00:53:52.334512589Z" level=info msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.398 [INFO][3610] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.398 [INFO][3610] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" iface="eth0" netns="/var/run/netns/cni-f0a28dbc-c96c-b609-abfd-a506f46580d0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.398 [INFO][3610] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" iface="eth0" netns="/var/run/netns/cni-f0a28dbc-c96c-b609-abfd-a506f46580d0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.399 [INFO][3610] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" iface="eth0" netns="/var/run/netns/cni-f0a28dbc-c96c-b609-abfd-a506f46580d0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.399 [INFO][3610] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.399 [INFO][3610] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.435 [INFO][3618] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.435 [INFO][3618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.435 [INFO][3618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.496 [WARNING][3618] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.496 [INFO][3618] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.498 [INFO][3618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:52.504444 env[1219]: 2025-05-08 00:53:52.501 [INFO][3610] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:53:52.505020 env[1219]: time="2025-05-08T00:53:52.504987624Z" level=info msg="TearDown network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" successfully" May 8 00:53:52.505090 env[1219]: time="2025-05-08T00:53:52.505073883Z" level=info msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" returns successfully" May 8 00:53:52.505759 env[1219]: time="2025-05-08T00:53:52.505731145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxxq,Uid:f0773fa0-2f79-4143-a60d-2de26f98e45d,Namespace:calico-system,Attempt:1,}" May 8 00:53:52.506918 systemd[1]: run-netns-cni\x2df0a28dbc\x2dc96c\x2db609\x2dabfd\x2da506f46580d0.mount: Deactivated successfully. May 8 00:53:52.796963 systemd-networkd[1044]: calib69b67fda42: Gained IPv6LL May 8 00:53:53.045701 systemd-networkd[1044]: cali538e13f3ce3: Link UP May 8 00:53:53.050584 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:53:53.050639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali538e13f3ce3: link becomes ready May 8 00:53:53.050712 systemd-networkd[1044]: cali538e13f3ce3: Gained carrier May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:52.959 [INFO][3625] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--ttxxq-eth0 csi-node-driver- calico-system f0773fa0-2f79-4143-a60d-2de26f98e45d 819 0 2025-05-08 00:53:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-ttxxq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali538e13f3ce3 [] []}} ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:52.959 [INFO][3625] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:52.997 [INFO][3641] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" HandleID="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.007 [INFO][3641] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" HandleID="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d98d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-ttxxq", "timestamp":"2025-05-08 00:53:52.997662554 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.007 [INFO][3641] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.007 [INFO][3641] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.007 [INFO][3641] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.009 [INFO][3641] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.013 [INFO][3641] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.017 [INFO][3641] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.018 [INFO][3641] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.020 [INFO][3641] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.020 [INFO][3641] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.021 [INFO][3641] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3 May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.029 [INFO][3641] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.042 [INFO][3641] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.042 [INFO][3641] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" host="localhost" May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.042 [INFO][3641] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:53.074794 env[1219]: 2025-05-08 00:53:53.042 [INFO][3641] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" HandleID="k8s-pod-network.246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.044 [INFO][3625] cni-plugin/k8s.go 386: Populated endpoint ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ttxxq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f0773fa0-2f79-4143-a60d-2de26f98e45d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-ttxxq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali538e13f3ce3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.044 [INFO][3625] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.044 [INFO][3625] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali538e13f3ce3 ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.051 [INFO][3625] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.051 [INFO][3625] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ttxxq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f0773fa0-2f79-4143-a60d-2de26f98e45d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3", Pod:"csi-node-driver-ttxxq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali538e13f3ce3", MAC:"16:8a:45:11:44:62", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:53.075410 env[1219]: 2025-05-08 00:53:53.072 [INFO][3625] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3" Namespace="calico-system" Pod="csi-node-driver-ttxxq" WorkloadEndpoint="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:53:53.081000 audit[3658]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3658 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:53.081000 audit[3658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffffef30ed0 a2=0 a3=ffff8a2fffa8 items=0 ppid=3217 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.081000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:53.091228 env[1219]: time="2025-05-08T00:53:53.091162383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:53.091337 env[1219]: time="2025-05-08T00:53:53.091241119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:53.091337 env[1219]: time="2025-05-08T00:53:53.091269085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:53.092993 env[1219]: time="2025-05-08T00:53:53.091508295Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3 pid=3670 runtime=io.containerd.runc.v2 May 8 00:53:53.124112 systemd[1]: Started cri-containerd-246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3.scope. May 8 00:53:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.138000 audit: BPF prog-id=159 op=LOAD May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234366532303730656562643732663764303261326233393838306238 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234366532303730656562643732663764303261326233393838306238 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.139000 audit: BPF prog-id=160 op=LOAD May 8 00:53:53.139000 audit[3682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234366532303730656562643732663764303261326233393838306238 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.140000 audit: BPF prog-id=161 op=LOAD May 8 00:53:53.140000 audit[3682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234366532303730656562643732663764303261326233393838306238 May 8 00:53:53.140000 audit: BPF prog-id=161 op=UNLOAD May 8 00:53:53.141000 audit: BPF prog-id=160 op=UNLOAD May 8 00:53:53.141000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.141000 audit: BPF prog-id=162 op=LOAD May 8 00:53:53.141000 audit[3682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234366532303730656562643732663764303261326233393838306238 May 8 00:53:53.143164 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:53.153307 env[1219]: time="2025-05-08T00:53:53.153261993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxxq,Uid:f0773fa0-2f79-4143-a60d-2de26f98e45d,Namespace:calico-system,Attempt:1,} returns sandbox id \"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3\"" May 8 00:53:53.568635 env[1219]: time="2025-05-08T00:53:53.568587475Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:53.570206 env[1219]: time="2025-05-08T00:53:53.570162927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:53.571560 env[1219]: time="2025-05-08T00:53:53.571534015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:53.572815 env[1219]: time="2025-05-08T00:53:53.572777836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:53.573966 env[1219]: time="2025-05-08T00:53:53.573209207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 8 00:53:53.575331 env[1219]: time="2025-05-08T00:53:53.575297606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:53:53.575800 env[1219]: time="2025-05-08T00:53:53.575773786Z" level=info msg="CreateContainer within sandbox \"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:53:53.589815 env[1219]: time="2025-05-08T00:53:53.589759845Z" level=info msg="CreateContainer within sandbox \"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3309d263fe891242a2a319840293992ca36c42ed76f31e46ceb6c387f0807b8a\"" May 8 00:53:53.590387 env[1219]: time="2025-05-08T00:53:53.590345088Z" level=info msg="StartContainer for \"3309d263fe891242a2a319840293992ca36c42ed76f31e46ceb6c387f0807b8a\"" May 8 00:53:53.610861 systemd[1]: Started cri-containerd-3309d263fe891242a2a319840293992ca36c42ed76f31e46ceb6c387f0807b8a.scope. May 8 00:53:53.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.641000 audit: BPF prog-id=163 op=LOAD May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3561 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303964323633666538393132343261326133313938343032393339 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3561 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303964323633666538393132343261326133313938343032393339 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit: BPF prog-id=164 op=LOAD May 8 00:53:53.642000 audit[3711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3561 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303964323633666538393132343261326133313938343032393339 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.642000 audit: BPF prog-id=165 op=LOAD May 8 00:53:53.642000 audit[3711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3561 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303964323633666538393132343261326133313938343032393339 May 8 00:53:53.643000 audit: BPF prog-id=165 op=UNLOAD May 8 00:53:53.643000 audit: BPF prog-id=164 op=UNLOAD May 8 00:53:53.643000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:53.643000 audit: BPF prog-id=166 op=LOAD May 8 00:53:53.643000 audit[3711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3561 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:53.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303964323633666538393132343261326133313938343032393339 May 8 00:53:53.663647 env[1219]: time="2025-05-08T00:53:53.663597962Z" level=info msg="StartContainer for \"3309d263fe891242a2a319840293992ca36c42ed76f31e46ceb6c387f0807b8a\" returns successfully" May 8 00:53:54.332587 env[1219]: time="2025-05-08T00:53:54.332277782Z" level=info msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" May 8 00:53:54.332587 env[1219]: time="2025-05-08T00:53:54.332523992Z" level=info msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" May 8 00:53:54.335358 env[1219]: time="2025-05-08T00:53:54.335317163Z" level=info msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" iface="eth0" netns="/var/run/netns/cni-85ea9b94-dbec-152f-85ba-5706ede1c463" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" iface="eth0" netns="/var/run/netns/cni-85ea9b94-dbec-152f-85ba-5706ede1c463" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" iface="eth0" netns="/var/run/netns/cni-85ea9b94-dbec-152f-85ba-5706ede1c463" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.424 [INFO][3799] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.449 [INFO][3818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.450 [INFO][3818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.450 [INFO][3818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.459 [WARNING][3818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.459 [INFO][3818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.460 [INFO][3818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:54.469886 env[1219]: 2025-05-08 00:53:54.468 [INFO][3799] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:53:54.470291 env[1219]: time="2025-05-08T00:53:54.470040938Z" level=info msg="TearDown network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" successfully" May 8 00:53:54.470291 env[1219]: time="2025-05-08T00:53:54.470071985Z" level=info msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" returns successfully" May 8 00:53:54.470632 kubelet[1955]: E0508 00:53:54.470601 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:54.472184 env[1219]: time="2025-05-08T00:53:54.472062712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2n5j2,Uid:25c7ff6e-341a-4235-8805-abda8ab8a7c8,Namespace:kube-system,Attempt:1,}" May 8 00:53:54.475852 systemd[1]: run-netns-cni\x2d85ea9b94\x2ddbec\x2d152f\x2d85ba\x2d5706ede1c463.mount: Deactivated successfully. May 8 00:53:54.496443 kubelet[1955]: I0508 00:53:54.495618 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-rb2f5" podStartSLOduration=22.618906834 podStartE2EDuration="24.495600482s" podCreationTimestamp="2025-05-08 00:53:30 +0000 UTC" firstStartedPulling="2025-05-08 00:53:51.697357536 +0000 UTC m=+34.430109487" lastFinishedPulling="2025-05-08 00:53:53.574051224 +0000 UTC m=+36.306803135" observedRunningTime="2025-05-08 00:53:54.49456171 +0000 UTC m=+37.227313661" watchObservedRunningTime="2025-05-08 00:53:54.495600482 +0000 UTC m=+37.228352393" May 8 00:53:54.513935 kernel: kauditd_printk_skb: 178 callbacks suppressed May 8 00:53:54.514241 kernel: audit: type=1325 audit(1746665634.509:1178): table=filter:103 family=2 entries=16 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:54.514517 kernel: audit: type=1300 audit(1746665634.509:1178): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffebdc2cd0 a2=0 a3=1 items=0 ppid=2106 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.509000 audit[3844]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:54.509000 audit[3844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffebdc2cd0 a2=0 a3=1 items=0 ppid=2106 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:54.519163 kernel: audit: type=1327 audit(1746665634.509:1178): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:54.522160 kubelet[1955]: E0508 00:53:54.521668 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:54.521352 systemd[1]: run-netns-cni\x2d20ac2fdd\x2d7f1a\x2d2c46\x2d11e9\x2dddd7c9a07c39.mount: Deactivated successfully. May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.428 [INFO][3804] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.428 [INFO][3804] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" iface="eth0" netns="/var/run/netns/cni-20ac2fdd-7f1a-2c46-11e9-ddd7c9a07c39" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.429 [INFO][3804] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" iface="eth0" netns="/var/run/netns/cni-20ac2fdd-7f1a-2c46-11e9-ddd7c9a07c39" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.429 [INFO][3804] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" iface="eth0" netns="/var/run/netns/cni-20ac2fdd-7f1a-2c46-11e9-ddd7c9a07c39" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.429 [INFO][3804] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.429 [INFO][3804] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.474 [INFO][3828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.474 [INFO][3828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.474 [INFO][3828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.487 [WARNING][3828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.491 [INFO][3828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.498 [INFO][3828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:54.522294 env[1219]: 2025-05-08 00:53:54.502 [INFO][3804] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:53:54.522294 env[1219]: time="2025-05-08T00:53:54.519744097Z" level=info msg="TearDown network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" successfully" May 8 00:53:54.522294 env[1219]: time="2025-05-08T00:53:54.519776144Z" level=info msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" returns successfully" May 8 00:53:54.524304 env[1219]: time="2025-05-08T00:53:54.523955158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tpmsp,Uid:803dfaf5-ed95-4afa-bd92-f764f51ebe32,Namespace:kube-system,Attempt:1,}" May 8 00:53:54.524000 audit[3844]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.425 [INFO][3786] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.426 [INFO][3786] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" iface="eth0" netns="/var/run/netns/cni-8eadb688-1e65-51e2-e492-2febb97e6484" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.426 [INFO][3786] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" iface="eth0" netns="/var/run/netns/cni-8eadb688-1e65-51e2-e492-2febb97e6484" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.426 [INFO][3786] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" iface="eth0" netns="/var/run/netns/cni-8eadb688-1e65-51e2-e492-2febb97e6484" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.426 [INFO][3786] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.426 [INFO][3786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.507 [INFO][3821] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.507 [INFO][3821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.507 [INFO][3821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.517 [WARNING][3821] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.517 [INFO][3821] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.519 [INFO][3821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:54.526912 env[1219]: 2025-05-08 00:53:54.521 [INFO][3786] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:53:54.524000 audit[3844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffebdc2cd0 a2=0 a3=1 items=0 ppid=2106 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.528908 systemd[1]: run-netns-cni\x2d8eadb688\x2d1e65\x2d51e2\x2de492\x2d2febb97e6484.mount: Deactivated successfully. May 8 00:53:54.531349 kernel: audit: type=1325 audit(1746665634.524:1179): table=nat:104 family=2 entries=14 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:54.531457 kernel: audit: type=1300 audit(1746665634.524:1179): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffebdc2cd0 a2=0 a3=1 items=0 ppid=2106 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.531442 systemd-networkd[1044]: cali538e13f3ce3: Gained IPv6LL May 8 00:53:54.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:54.532247 env[1219]: time="2025-05-08T00:53:54.532076017Z" level=info msg="TearDown network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" successfully" May 8 00:53:54.532247 env[1219]: time="2025-05-08T00:53:54.532118386Z" level=info msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" returns successfully" May 8 00:53:54.532810 env[1219]: time="2025-05-08T00:53:54.532776521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-67d5cd68b9-z7snx,Uid:fdf92870-cefa-4485-a6de-9c7e16d2b0d2,Namespace:calico-system,Attempt:1,}" May 8 00:53:54.533814 kernel: audit: type=1327 audit(1746665634.524:1179): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:54.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:33358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:54.606898 systemd[1]: Started sshd@9-10.0.0.136:22-10.0.0.1:33358.service. May 8 00:53:54.611027 kernel: audit: type=1130 audit(1746665634.606:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:33358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:54.722531 sshd[3893]: Accepted publickey for core from 10.0.0.1 port 33358 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:54.722892 env[1219]: time="2025-05-08T00:53:54.721398632Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:54.723188 env[1219]: time="2025-05-08T00:53:54.722983636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:54.720000 audit[3893]: USER_ACCT pid=3893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.726852 kernel: audit: type=1101 audit(1746665634.720:1181): pid=3893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.726000 audit[3893]: CRED_ACQ pid=3893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.730820 sshd[3893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:54.733243 kernel: audit: type=1103 audit(1746665634.726:1182): pid=3893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.733310 kernel: audit: type=1006 audit(1746665634.726:1183): pid=3893 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 8 00:53:54.726000 audit[3893]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9a4f120 a2=3 a3=1 items=0 ppid=1 pid=3893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:54.735102 env[1219]: time="2025-05-08T00:53:54.734616694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:54.739349 systemd-logind[1206]: New session 10 of user core. May 8 00:53:54.740386 env[1219]: time="2025-05-08T00:53:54.739748263Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:54.740058 systemd[1]: Started session-10.scope. May 8 00:53:54.740598 env[1219]: time="2025-05-08T00:53:54.740536984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 8 00:53:54.743805 env[1219]: time="2025-05-08T00:53:54.743732677Z" level=info msg="CreateContainer within sandbox \"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:53:54.758000 audit[3893]: USER_START pid=3893 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.760000 audit[3921]: CRED_ACQ pid=3921 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.762385 systemd-networkd[1044]: cali0d6465b60d7: Link UP May 8 00:53:54.764407 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:53:54.764518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d6465b60d7: link becomes ready May 8 00:53:54.764659 systemd-networkd[1044]: cali0d6465b60d7: Gained carrier May 8 00:53:54.773873 env[1219]: time="2025-05-08T00:53:54.773160412Z" level=info msg="CreateContainer within sandbox \"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9ac90233df1f25dfb41b4a73479613bc799aea0652cb820092cc2e3b9069ebd5\"" May 8 00:53:54.773873 env[1219]: time="2025-05-08T00:53:54.773732688Z" level=info msg="StartContainer for \"9ac90233df1f25dfb41b4a73479613bc799aea0652cb820092cc2e3b9069ebd5\"" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.611 [INFO][3860] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0 coredns-6f6b679f8f- kube-system 803dfaf5-ed95-4afa-bd92-f764f51ebe32 846 0 2025-05-08 00:53:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-tpmsp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0d6465b60d7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.612 [INFO][3860] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.660 [INFO][3896] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" HandleID="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.711 [INFO][3896] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" HandleID="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003ad370), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-tpmsp", "timestamp":"2025-05-08 00:53:54.660587923 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.711 [INFO][3896] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.712 [INFO][3896] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.712 [INFO][3896] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.713 [INFO][3896] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.718 [INFO][3896] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.723 [INFO][3896] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.727 [INFO][3896] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.732 [INFO][3896] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.732 [INFO][3896] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.735 [INFO][3896] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.742 [INFO][3896] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.748 [INFO][3896] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.748 [INFO][3896] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" host="localhost" May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.748 [INFO][3896] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:54.784426 env[1219]: 2025-05-08 00:53:54.749 [INFO][3896] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" HandleID="k8s-pod-network.78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.754 [INFO][3860] cni-plugin/k8s.go 386: Populated endpoint ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"803dfaf5-ed95-4afa-bd92-f764f51ebe32", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-tpmsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6465b60d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.754 [INFO][3860] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.754 [INFO][3860] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0d6465b60d7 ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.767 [INFO][3860] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.769 [INFO][3860] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"803dfaf5-ed95-4afa-bd92-f764f51ebe32", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd", Pod:"coredns-6f6b679f8f-tpmsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6465b60d7", MAC:"12:39:ff:dd:75:65", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:54.785175 env[1219]: 2025-05-08 00:53:54.777 [INFO][3860] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd" Namespace="kube-system" Pod="coredns-6f6b679f8f-tpmsp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:53:54.798000 audit[3958]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3958 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:54.798000 audit[3958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=ffffc490b050 a2=0 a3=ffff8dd54fa8 items=0 ppid=3217 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:54.800557 systemd[1]: Started cri-containerd-9ac90233df1f25dfb41b4a73479613bc799aea0652cb820092cc2e3b9069ebd5.scope. May 8 00:53:54.805157 env[1219]: time="2025-05-08T00:53:54.805088657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:54.805293 env[1219]: time="2025-05-08T00:53:54.805138187Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:54.805293 env[1219]: time="2025-05-08T00:53:54.805153270Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:54.805541 env[1219]: time="2025-05-08T00:53:54.805502462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd pid=3963 runtime=io.containerd.runc.v2 May 8 00:53:54.841980 systemd[1]: Started cri-containerd-78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd.scope. May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3670 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633930323333646631663235646662343162346137333437393631 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.849000 audit: BPF prog-id=167 op=LOAD May 8 00:53:54.849000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3670 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633930323333646631663235646662343162346137333437393631 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit: BPF prog-id=168 op=LOAD May 8 00:53:54.851000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3670 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633930323333646631663235646662343162346137333437393631 May 8 00:53:54.851000 audit: BPF prog-id=168 op=UNLOAD May 8 00:53:54.851000 audit: BPF prog-id=167 op=UNLOAD May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.851000 audit: BPF prog-id=169 op=LOAD May 8 00:53:54.851000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3670 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633930323333646631663235646662343162346137333437393631 May 8 00:53:54.876166 env[1219]: time="2025-05-08T00:53:54.876058322Z" level=info msg="StartContainer for \"9ac90233df1f25dfb41b4a73479613bc799aea0652cb820092cc2e3b9069ebd5\" returns successfully" May 8 00:53:54.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit: BPF prog-id=170 op=LOAD May 8 00:53:54.885757 env[1219]: time="2025-05-08T00:53:54.885717136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3963 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738666463336231316464333536393233616138376438666439663833 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3963 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738666463336231316464333536393233616138376438666439663833 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit: BPF prog-id=171 op=LOAD May 8 00:53:54.884000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3963 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738666463336231316464333536393233616138376438666439663833 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.884000 audit: BPF prog-id=172 op=LOAD May 8 00:53:54.884000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3963 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738666463336231316464333536393233616138376438666439663833 May 8 00:53:54.885000 audit: BPF prog-id=172 op=UNLOAD May 8 00:53:54.885000 audit: BPF prog-id=171 op=UNLOAD May 8 00:53:54.885000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:54.885000 audit: BPF prog-id=173 op=LOAD May 8 00:53:54.885000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3963 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738666463336231316464333536393233616138376438666439663833 May 8 00:53:54.888877 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:54.914192 systemd-networkd[1044]: cali8e23798bf5e: Link UP May 8 00:53:54.914851 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8e23798bf5e: link becomes ready May 8 00:53:54.914910 systemd-networkd[1044]: cali8e23798bf5e: Gained carrier May 8 00:53:54.931265 env[1219]: time="2025-05-08T00:53:54.931225758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tpmsp,Uid:803dfaf5-ed95-4afa-bd92-f764f51ebe32,Namespace:kube-system,Attempt:1,} returns sandbox id \"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd\"" May 8 00:53:54.932264 kubelet[1955]: E0508 00:53:54.932215 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.567 [INFO][3843] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0 coredns-6f6b679f8f- kube-system 25c7ff6e-341a-4235-8805-abda8ab8a7c8 845 0 2025-05-08 00:53:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-2n5j2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8e23798bf5e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.568 [INFO][3843] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.675 [INFO][3875] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" HandleID="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.712 [INFO][3875] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" HandleID="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000305ba0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-2n5j2", "timestamp":"2025-05-08 00:53:54.675869007 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.712 [INFO][3875] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.748 [INFO][3875] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.748 [INFO][3875] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.815 [INFO][3875] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.870 [INFO][3875] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.881 [INFO][3875] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.885 [INFO][3875] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.888 [INFO][3875] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.888 [INFO][3875] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.895 [INFO][3875] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.901 [INFO][3875] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.908 [INFO][3875] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.908 [INFO][3875] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" host="localhost" May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.908 [INFO][3875] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:54.938596 env[1219]: 2025-05-08 00:53:54.908 [INFO][3875] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" HandleID="k8s-pod-network.eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.912 [INFO][3843] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"25c7ff6e-341a-4235-8805-abda8ab8a7c8", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-2n5j2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e23798bf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.912 [INFO][3843] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.912 [INFO][3843] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8e23798bf5e ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.915 [INFO][3843] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.915 [INFO][3843] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"25c7ff6e-341a-4235-8805-abda8ab8a7c8", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d", Pod:"coredns-6f6b679f8f-2n5j2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e23798bf5e", MAC:"36:94:d0:9b:c5:f1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:54.939248 env[1219]: 2025-05-08 00:53:54.933 [INFO][3843] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d" Namespace="kube-system" Pod="coredns-6f6b679f8f-2n5j2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:53:54.939248 env[1219]: time="2025-05-08T00:53:54.938392743Z" level=info msg="CreateContainer within sandbox \"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:53:54.950000 audit[4039]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:54.950000 audit[4039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=fffff7f76520 a2=0 a3=ffffb63f2fa8 items=0 ppid=3217 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:54.950000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:54.959306 env[1219]: time="2025-05-08T00:53:54.958101531Z" level=info msg="CreateContainer within sandbox \"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"67f7ada15ac015cf123af21b119cb894fb37755f6fcfd7086c4a9c0352c3c5fb\"" May 8 00:53:54.960446 env[1219]: time="2025-05-08T00:53:54.960063332Z" level=info msg="StartContainer for \"67f7ada15ac015cf123af21b119cb894fb37755f6fcfd7086c4a9c0352c3c5fb\"" May 8 00:53:54.961302 env[1219]: time="2025-05-08T00:53:54.961141072Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:54.961389 env[1219]: time="2025-05-08T00:53:54.961244213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:54.961389 env[1219]: time="2025-05-08T00:53:54.961337952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:54.962486 env[1219]: time="2025-05-08T00:53:54.961578321Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d pid=4048 runtime=io.containerd.runc.v2 May 8 00:53:54.972456 sshd[3893]: pam_unix(sshd:session): session closed for user core May 8 00:53:54.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:33364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:54.976299 systemd[1]: Started sshd@10-10.0.0.136:22-10.0.0.1:33364.service. May 8 00:53:54.979000 audit[3893]: USER_END pid=3893 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.979000 audit[3893]: CRED_DISP pid=3893 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:54.982043 systemd[1]: sshd@9-10.0.0.136:22-10.0.0.1:33358.service: Deactivated successfully. May 8 00:53:54.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:33358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:54.982734 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:53:54.983457 systemd-logind[1206]: Session 10 logged out. Waiting for processes to exit. May 8 00:53:54.984353 systemd-logind[1206]: Removed session 10. May 8 00:53:55.012689 systemd[1]: Started cri-containerd-67f7ada15ac015cf123af21b119cb894fb37755f6fcfd7086c4a9c0352c3c5fb.scope. May 8 00:53:55.014445 sshd[4070]: Accepted publickey for core from 10.0.0.1 port 33364 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:55.013000 audit[4070]: USER_ACCT pid=4070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.017950 systemd[1]: Started cri-containerd-eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d.scope. May 8 00:53:55.021281 sshd[4070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:55.020000 audit[4070]: CRED_ACQ pid=4070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.020000 audit[4070]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc627af0 a2=3 a3=1 items=0 ppid=1 pid=4070 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:55.023279 systemd-networkd[1044]: cali4378b4794c2: Link UP May 8 00:53:55.024514 systemd-networkd[1044]: cali4378b4794c2: Gained carrier May 8 00:53:55.024870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4378b4794c2: link becomes ready May 8 00:53:55.035092 systemd[1]: Started session-11.scope. May 8 00:53:55.037163 systemd-logind[1206]: New session 11 of user core. May 8 00:53:55.042000 audit[4070]: USER_START pid=4070 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.044000 audit[4105]: CRED_ACQ pid=4105 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.659 [INFO][3876] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0 calico-kube-controllers-67d5cd68b9- calico-system fdf92870-cefa-4485-a6de-9c7e16d2b0d2 844 0 2025-05-08 00:53:31 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:67d5cd68b9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-67d5cd68b9-z7snx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4378b4794c2 [] []}} ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.659 [INFO][3876] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.744 [INFO][3908] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" HandleID="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.870 [INFO][3908] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" HandleID="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400036b720), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-67d5cd68b9-z7snx", "timestamp":"2025-05-08 00:53:54.744250863 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.870 [INFO][3908] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.908 [INFO][3908] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.908 [INFO][3908] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.916 [INFO][3908] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.971 [INFO][3908] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.986 [INFO][3908] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.988 [INFO][3908] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.992 [INFO][3908] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.992 [INFO][3908] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:54.997 [INFO][3908] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068 May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:55.003 [INFO][3908] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:55.008 [INFO][3908] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:55.008 [INFO][3908] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" host="localhost" May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:55.008 [INFO][3908] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:55.045315 env[1219]: 2025-05-08 00:53:55.008 [INFO][3908] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" HandleID="k8s-pod-network.571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.010 [INFO][3876] cni-plugin/k8s.go 386: Populated endpoint ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0", GenerateName:"calico-kube-controllers-67d5cd68b9-", Namespace:"calico-system", SelfLink:"", UID:"fdf92870-cefa-4485-a6de-9c7e16d2b0d2", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"67d5cd68b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-67d5cd68b9-z7snx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4378b4794c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.015 [INFO][3876] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.015 [INFO][3876] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4378b4794c2 ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.024 [INFO][3876] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.025 [INFO][3876] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0", GenerateName:"calico-kube-controllers-67d5cd68b9-", Namespace:"calico-system", SelfLink:"", UID:"fdf92870-cefa-4485-a6de-9c7e16d2b0d2", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"67d5cd68b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068", Pod:"calico-kube-controllers-67d5cd68b9-z7snx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4378b4794c2", MAC:"5e:09:6b:9b:ad:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:55.045956 env[1219]: 2025-05-08 00:53:55.038 [INFO][3876] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068" Namespace="calico-system" Pod="calico-kube-controllers-67d5cd68b9-z7snx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:53:55.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit: BPF prog-id=174 op=LOAD May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3963 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663761646131356163303135636631323361663231623131396362 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3963 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663761646131356163303135636631323361663231623131396362 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit: BPF prog-id=175 op=LOAD May 8 00:53:55.063000 audit[4068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3963 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663761646131356163303135636631323361663231623131396362 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit: BPF prog-id=176 op=LOAD May 8 00:53:55.063000 audit[4068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3963 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663761646131356163303135636631323361663231623131396362 May 8 00:53:55.063000 audit: BPF prog-id=176 op=UNLOAD May 8 00:53:55.063000 audit: BPF prog-id=175 op=UNLOAD May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.063000 audit: BPF prog-id=177 op=LOAD May 8 00:53:55.063000 audit[4068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3963 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663761646131356163303135636631323361663231623131396362 May 8 00:53:55.066000 audit[4120]: NETFILTER_CFG table=filter:107 family=2 entries=46 op=nft_register_chain pid=4120 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:55.066000 audit[4120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22204 a0=3 a1=fffff7970d00 a2=0 a3=ffffa2b05fa8 items=0 ppid=3217 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.066000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.069000 audit: BPF prog-id=178 op=LOAD May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4048 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633333343161366362613565656336653037363666333439396564 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4048 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633333343161366362613565656336653037363666333439396564 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit: BPF prog-id=179 op=LOAD May 8 00:53:55.070000 audit[4063]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4048 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633333343161366362613565656336653037363666333439396564 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit: BPF prog-id=180 op=LOAD May 8 00:53:55.070000 audit[4063]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4048 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633333343161366362613565656336653037363666333439396564 May 8 00:53:55.070000 audit: BPF prog-id=180 op=UNLOAD May 8 00:53:55.070000 audit: BPF prog-id=179 op=UNLOAD May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.070000 audit: BPF prog-id=181 op=LOAD May 8 00:53:55.070000 audit[4063]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4048 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633333343161366362613565656336653037363666333439396564 May 8 00:53:55.071938 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:55.077889 env[1219]: time="2025-05-08T00:53:55.077788577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:55.077889 env[1219]: time="2025-05-08T00:53:55.077858151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:55.077889 env[1219]: time="2025-05-08T00:53:55.077868793Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:55.078925 env[1219]: time="2025-05-08T00:53:55.078884195Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068 pid=4128 runtime=io.containerd.runc.v2 May 8 00:53:55.083812 env[1219]: time="2025-05-08T00:53:55.083770047Z" level=info msg="StartContainer for \"67f7ada15ac015cf123af21b119cb894fb37755f6fcfd7086c4a9c0352c3c5fb\" returns successfully" May 8 00:53:55.095732 systemd[1]: Started cri-containerd-571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068.scope. May 8 00:53:55.102061 env[1219]: time="2025-05-08T00:53:55.101160667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2n5j2,Uid:25c7ff6e-341a-4235-8805-abda8ab8a7c8,Namespace:kube-system,Attempt:1,} returns sandbox id \"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d\"" May 8 00:53:55.102356 kubelet[1955]: E0508 00:53:55.102321 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:55.109393 env[1219]: time="2025-05-08T00:53:55.106568023Z" level=info msg="CreateContainer within sandbox \"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:53:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.129000 audit: BPF prog-id=182 op=LOAD May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4128 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316135373433626135383134303032623936306231616236303633 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4128 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316135373433626135383134303032623936306231616236303633 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit: BPF prog-id=183 op=LOAD May 8 00:53:55.134000 audit[4143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4128 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316135373433626135383134303032623936306231616236303633 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit: BPF prog-id=184 op=LOAD May 8 00:53:55.134000 audit[4143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4128 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316135373433626135383134303032623936306231616236303633 May 8 00:53:55.134000 audit: BPF prog-id=184 op=UNLOAD May 8 00:53:55.134000 audit: BPF prog-id=183 op=UNLOAD May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.134000 audit: BPF prog-id=185 op=LOAD May 8 00:53:55.134000 audit[4143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4128 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316135373433626135383134303032623936306231616236303633 May 8 00:53:55.137213 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:55.155708 env[1219]: time="2025-05-08T00:53:55.155659311Z" level=info msg="CreateContainer within sandbox \"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9f85aef5df9670e2aa0a47252cbc369751178f059dc00414a2cd5c47eef8168e\"" May 8 00:53:55.156344 env[1219]: time="2025-05-08T00:53:55.156312921Z" level=info msg="StartContainer for \"9f85aef5df9670e2aa0a47252cbc369751178f059dc00414a2cd5c47eef8168e\"" May 8 00:53:55.183248 env[1219]: time="2025-05-08T00:53:55.183196750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-67d5cd68b9-z7snx,Uid:fdf92870-cefa-4485-a6de-9c7e16d2b0d2,Namespace:calico-system,Attempt:1,} returns sandbox id \"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068\"" May 8 00:53:55.196616 systemd[1]: Started cri-containerd-9f85aef5df9670e2aa0a47252cbc369751178f059dc00414a2cd5c47eef8168e.scope. May 8 00:53:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit: BPF prog-id=186 op=LOAD May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=4048 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383561656635646639363730653261613061343732353263626333 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=4048 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383561656635646639363730653261613061343732353263626333 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit: BPF prog-id=187 op=LOAD May 8 00:53:55.223000 audit[4193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=4048 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383561656635646639363730653261613061343732353263626333 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.223000 audit: BPF prog-id=188 op=LOAD May 8 00:53:55.223000 audit[4193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=4048 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383561656635646639363730653261613061343732353263626333 May 8 00:53:55.223000 audit: BPF prog-id=188 op=UNLOAD May 8 00:53:55.223000 audit: BPF prog-id=187 op=UNLOAD May 8 00:53:55.224000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.224000 audit: BPF prog-id=189 op=LOAD May 8 00:53:55.224000 audit[4193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=4048 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383561656635646639363730653261613061343732353263626333 May 8 00:53:55.235000 audit[3720]: AVC avc: denied { watch } for pid=3720 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_53_39.2191058363/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c654 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c165,c654 tclass=file permissive=0 May 8 00:53:55.235000 audit[3720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000c3dfc0 a2=fc6 a3=0 items=0 ppid=3561 pid=3720 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c654 key=(null) May 8 00:53:55.235000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:53:55.260132 env[1219]: time="2025-05-08T00:53:55.260073927Z" level=info msg="StartContainer for \"9f85aef5df9670e2aa0a47252cbc369751178f059dc00414a2cd5c47eef8168e\" returns successfully" May 8 00:53:55.294082 sshd[4070]: pam_unix(sshd:session): session closed for user core May 8 00:53:55.296445 systemd[1]: Started sshd@11-10.0.0.136:22-10.0.0.1:33366.service. May 8 00:53:55.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:33366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:55.296000 audit[4070]: USER_END pid=4070 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.296000 audit[4070]: CRED_DISP pid=4070 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.299016 systemd[1]: sshd@10-10.0.0.136:22-10.0.0.1:33364.service: Deactivated successfully. May 8 00:53:55.299644 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:53:55.300029 systemd-logind[1206]: Session 11 logged out. Waiting for processes to exit. May 8 00:53:55.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:33364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:55.303076 systemd-logind[1206]: Removed session 11. May 8 00:53:55.332964 env[1219]: time="2025-05-08T00:53:55.332919822Z" level=info msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" May 8 00:53:55.343071 sshd[4227]: Accepted publickey for core from 10.0.0.1 port 33366 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:55.342000 audit[4227]: USER_ACCT pid=4227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.345000 audit[4227]: CRED_ACQ pid=4227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.345000 audit[4227]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0e4f0c0 a2=3 a3=1 items=0 ppid=1 pid=4227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:55.346577 sshd[4227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:55.355049 systemd[1]: Started session-12.scope. May 8 00:53:55.355182 systemd-logind[1206]: New session 12 of user core. May 8 00:53:55.358000 audit[4227]: USER_START pid=4227 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.360000 audit[4251]: CRED_ACQ pid=4251 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" iface="eth0" netns="/var/run/netns/cni-a500f56e-2d59-473b-eb78-3a4a0a47ee84" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" iface="eth0" netns="/var/run/netns/cni-a500f56e-2d59-473b-eb78-3a4a0a47ee84" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" iface="eth0" netns="/var/run/netns/cni-a500f56e-2d59-473b-eb78-3a4a0a47ee84" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.394 [INFO][4246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.426 [INFO][4256] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.426 [INFO][4256] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.426 [INFO][4256] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.434 [WARNING][4256] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.434 [INFO][4256] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.435 [INFO][4256] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:55.444504 env[1219]: 2025-05-08 00:53:55.438 [INFO][4246] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:53:55.444504 env[1219]: time="2025-05-08T00:53:55.444128430Z" level=info msg="TearDown network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" successfully" May 8 00:53:55.444504 env[1219]: time="2025-05-08T00:53:55.444158116Z" level=info msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" returns successfully" May 8 00:53:55.445264 env[1219]: time="2025-05-08T00:53:55.445233730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-6g6hv,Uid:545892ca-5c8d-4a5b-a50b-fc5743c8a4df,Namespace:calico-apiserver,Attempt:1,}" May 8 00:53:55.482097 systemd[1]: run-netns-cni\x2da500f56e\x2d2d59\x2d473b\x2deb78\x2d3a4a0a47ee84.mount: Deactivated successfully. May 8 00:53:55.492522 kubelet[1955]: E0508 00:53:55.490865 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:55.502174 kubelet[1955]: E0508 00:53:55.501407 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:55.528653 kubelet[1955]: I0508 00:53:55.528607 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:55.528000 audit[4286]: NETFILTER_CFG table=filter:108 family=2 entries=16 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:55.528000 audit[4286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffcfd8960 a2=0 a3=1 items=0 ppid=2106 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:55.530811 kubelet[1955]: I0508 00:53:55.530232 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-2n5j2" podStartSLOduration=31.53022032 podStartE2EDuration="31.53022032s" podCreationTimestamp="2025-05-08 00:53:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:55.511063468 +0000 UTC m=+38.243815419" watchObservedRunningTime="2025-05-08 00:53:55.53022032 +0000 UTC m=+38.262972271" May 8 00:53:55.534000 audit[4286]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:55.534000 audit[4286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffffcfd8960 a2=0 a3=1 items=0 ppid=2106 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:55.555299 kubelet[1955]: I0508 00:53:55.554899 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-tpmsp" podStartSLOduration=31.554882187 podStartE2EDuration="31.554882187s" podCreationTimestamp="2025-05-08 00:53:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:55.53052418 +0000 UTC m=+38.263276171" watchObservedRunningTime="2025-05-08 00:53:55.554882187 +0000 UTC m=+38.287634138" May 8 00:53:55.564000 audit[4288]: NETFILTER_CFG table=filter:110 family=2 entries=16 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:55.564000 audit[4288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc03cbab0 a2=0 a3=1 items=0 ppid=2106 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:55.566465 sshd[4227]: pam_unix(sshd:session): session closed for user core May 8 00:53:55.567000 audit[4227]: USER_END pid=4227 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.567000 audit[4227]: CRED_DISP pid=4227 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:55.569400 systemd[1]: sshd@11-10.0.0.136:22-10.0.0.1:33366.service: Deactivated successfully. May 8 00:53:55.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:33366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:55.570142 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:53:55.570657 systemd-logind[1206]: Session 12 logged out. Waiting for processes to exit. May 8 00:53:55.573045 systemd-logind[1206]: Removed session 12. May 8 00:53:55.571000 audit[4288]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:55.571000 audit[4288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc03cbab0 a2=0 a3=1 items=0 ppid=2106 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:55.648955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaba4935ac5e: link becomes ready May 8 00:53:55.648909 systemd-networkd[1044]: caliaba4935ac5e: Link UP May 8 00:53:55.649074 systemd-networkd[1044]: caliaba4935ac5e: Gained carrier May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.551 [INFO][4271] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0 calico-apiserver-5cf85bd5f9- calico-apiserver 545892ca-5c8d-4a5b-a50b-fc5743c8a4df 894 0 2025-05-08 00:53:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cf85bd5f9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5cf85bd5f9-6g6hv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliaba4935ac5e [] []}} ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.551 [INFO][4271] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.603 [INFO][4290] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" HandleID="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.615 [INFO][4290] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" HandleID="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003603b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5cf85bd5f9-6g6hv", "timestamp":"2025-05-08 00:53:55.603506382 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.615 [INFO][4290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.616 [INFO][4290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.616 [INFO][4290] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.618 [INFO][4290] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.622 [INFO][4290] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.626 [INFO][4290] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.629 [INFO][4290] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.632 [INFO][4290] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.632 [INFO][4290] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.633 [INFO][4290] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3 May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.637 [INFO][4290] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.643 [INFO][4290] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.643 [INFO][4290] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" host="localhost" May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.643 [INFO][4290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:55.662442 env[1219]: 2025-05-08 00:53:55.643 [INFO][4290] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" HandleID="k8s-pod-network.2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.645 [INFO][4271] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"545892ca-5c8d-4a5b-a50b-fc5743c8a4df", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5cf85bd5f9-6g6hv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliaba4935ac5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.646 [INFO][4271] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.646 [INFO][4271] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaba4935ac5e ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.649 [INFO][4271] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.649 [INFO][4271] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"545892ca-5c8d-4a5b-a50b-fc5743c8a4df", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3", Pod:"calico-apiserver-5cf85bd5f9-6g6hv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliaba4935ac5e", MAC:"f6:58:97:cd:ea:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:55.663047 env[1219]: 2025-05-08 00:53:55.659 [INFO][4271] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3" Namespace="calico-apiserver" Pod="calico-apiserver-5cf85bd5f9-6g6hv" WorkloadEndpoint="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:53:55.669000 audit[4313]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=4313 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:53:55.669000 audit[4313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25080 a0=3 a1=ffffed720110 a2=0 a3=ffff92f9efa8 items=0 ppid=3217 pid=4313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:53:55.674931 env[1219]: time="2025-05-08T00:53:55.674771802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:53:55.675049 env[1219]: time="2025-05-08T00:53:55.674940356Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:53:55.675049 env[1219]: time="2025-05-08T00:53:55.674977363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:53:55.675265 env[1219]: time="2025-05-08T00:53:55.675154358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3 pid=4321 runtime=io.containerd.runc.v2 May 8 00:53:55.690812 systemd[1]: run-containerd-runc-k8s.io-2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3-runc.AJJ5I0.mount: Deactivated successfully. May 8 00:53:55.693469 systemd[1]: Started cri-containerd-2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3.scope. May 8 00:53:55.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit: BPF prog-id=190 op=LOAD May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4321 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656130376531633030626235363433653138363635313839623332 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4321 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656130376531633030626235363433653138363635313839623332 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.715000 audit: BPF prog-id=191 op=LOAD May 8 00:53:55.715000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4321 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656130376531633030626235363433653138363635313839623332 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit: BPF prog-id=192 op=LOAD May 8 00:53:55.716000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4321 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656130376531633030626235363433653138363635313839623332 May 8 00:53:55.716000 audit: BPF prog-id=192 op=UNLOAD May 8 00:53:55.716000 audit: BPF prog-id=191 op=UNLOAD May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.716000 audit: BPF prog-id=193 op=LOAD May 8 00:53:55.716000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4321 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656130376531633030626235363433653138363635313839623332 May 8 00:53:55.718492 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:53:55.746906 env[1219]: time="2025-05-08T00:53:55.746822859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cf85bd5f9-6g6hv,Uid:545892ca-5c8d-4a5b-a50b-fc5743c8a4df,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3\"" May 8 00:53:55.749736 env[1219]: time="2025-05-08T00:53:55.749697631Z" level=info msg="CreateContainer within sandbox \"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:53:55.768705 env[1219]: time="2025-05-08T00:53:55.768639280Z" level=info msg="CreateContainer within sandbox \"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e768bf98ba9916e393a2b73504e9dbdbc2e97e01b8651189dbae9e4786df613d\"" May 8 00:53:55.769514 env[1219]: time="2025-05-08T00:53:55.769468605Z" level=info msg="StartContainer for \"e768bf98ba9916e393a2b73504e9dbdbc2e97e01b8651189dbae9e4786df613d\"" May 8 00:53:55.785844 systemd[1]: Started cri-containerd-e768bf98ba9916e393a2b73504e9dbdbc2e97e01b8651189dbae9e4786df613d.scope. May 8 00:53:55.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit: BPF prog-id=194 op=LOAD May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4321 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363862663938626139393136653339336132623733353034653964 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4321 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363862663938626139393136653339336132623733353034653964 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit: BPF prog-id=195 op=LOAD May 8 00:53:55.809000 audit[4361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4321 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363862663938626139393136653339336132623733353034653964 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.809000 audit: BPF prog-id=196 op=LOAD May 8 00:53:55.809000 audit[4361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4321 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363862663938626139393136653339336132623733353034653964 May 8 00:53:55.809000 audit: BPF prog-id=196 op=UNLOAD May 8 00:53:55.809000 audit: BPF prog-id=195 op=UNLOAD May 8 00:53:55.810000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { perfmon } for pid=4361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit[4361]: AVC avc: denied { bpf } for pid=4361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:55.810000 audit: BPF prog-id=197 op=LOAD May 8 00:53:55.810000 audit[4361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4321 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:55.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363862663938626139393136653339336132623733353034653964 May 8 00:53:55.842105 env[1219]: time="2025-05-08T00:53:55.842047166Z" level=info msg="StartContainer for \"e768bf98ba9916e393a2b73504e9dbdbc2e97e01b8651189dbae9e4786df613d\" returns successfully" May 8 00:53:55.996985 systemd-networkd[1044]: cali0d6465b60d7: Gained IPv6LL May 8 00:53:56.036613 env[1219]: time="2025-05-08T00:53:56.036557648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:56.038285 env[1219]: time="2025-05-08T00:53:56.038255777Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:56.040449 env[1219]: time="2025-05-08T00:53:56.040421637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:56.042295 env[1219]: time="2025-05-08T00:53:56.042264675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:56.042980 env[1219]: time="2025-05-08T00:53:56.042952368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 8 00:53:56.045079 env[1219]: time="2025-05-08T00:53:56.045045254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:53:56.046006 env[1219]: time="2025-05-08T00:53:56.045978915Z" level=info msg="CreateContainer within sandbox \"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:53:56.057398 env[1219]: time="2025-05-08T00:53:56.057349600Z" level=info msg="CreateContainer within sandbox \"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c67ac03ec0fb683a4ed1f843e7c0f143e8c1ffe3c9715cceb3b602bfa39f5550\"" May 8 00:53:56.057909 env[1219]: time="2025-05-08T00:53:56.057824172Z" level=info msg="StartContainer for \"c67ac03ec0fb683a4ed1f843e7c0f143e8c1ffe3c9715cceb3b602bfa39f5550\"" May 8 00:53:56.071844 systemd[1]: Started cri-containerd-c67ac03ec0fb683a4ed1f843e7c0f143e8c1ffe3c9715cceb3b602bfa39f5550.scope. May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3670 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376163303365633066623638336134656431663834336537633066 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit: BPF prog-id=198 op=LOAD May 8 00:53:56.099000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3670 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376163303365633066623638336134656431663834336537633066 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.099000 audit: BPF prog-id=199 op=LOAD May 8 00:53:56.099000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3670 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376163303365633066623638336134656431663834336537633066 May 8 00:53:56.100000 audit: BPF prog-id=199 op=UNLOAD May 8 00:53:56.100000 audit: BPF prog-id=198 op=UNLOAD May 8 00:53:56.100000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:56.100000 audit: BPF prog-id=200 op=LOAD May 8 00:53:56.100000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3670 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336376163303365633066623638336134656431663834336537633066 May 8 00:53:56.121619 env[1219]: time="2025-05-08T00:53:56.121571973Z" level=info msg="StartContainer for \"c67ac03ec0fb683a4ed1f843e7c0f143e8c1ffe3c9715cceb3b602bfa39f5550\" returns successfully" May 8 00:53:56.189009 systemd-networkd[1044]: cali4378b4794c2: Gained IPv6LL May 8 00:53:56.418994 kubelet[1955]: I0508 00:53:56.418955 1955 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:53:56.419185 kubelet[1955]: I0508 00:53:56.419089 1955 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:53:56.481062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970573626.mount: Deactivated successfully. May 8 00:53:56.534270 kubelet[1955]: E0508 00:53:56.534233 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:56.534593 kubelet[1955]: E0508 00:53:56.534336 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:56.544423 kubelet[1955]: I0508 00:53:56.544367 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cf85bd5f9-6g6hv" podStartSLOduration=26.544353193 podStartE2EDuration="26.544353193s" podCreationTimestamp="2025-05-08 00:53:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:53:56.543908466 +0000 UTC m=+39.276660417" watchObservedRunningTime="2025-05-08 00:53:56.544353193 +0000 UTC m=+39.277105144" May 8 00:53:56.555001 kubelet[1955]: I0508 00:53:56.554939 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ttxxq" podStartSLOduration=22.665742476 podStartE2EDuration="25.554916001s" podCreationTimestamp="2025-05-08 00:53:31 +0000 UTC" firstStartedPulling="2025-05-08 00:53:53.155068773 +0000 UTC m=+35.887820684" lastFinishedPulling="2025-05-08 00:53:56.044242258 +0000 UTC m=+38.776994209" observedRunningTime="2025-05-08 00:53:56.554865631 +0000 UTC m=+39.287617662" watchObservedRunningTime="2025-05-08 00:53:56.554916001 +0000 UTC m=+39.287667912" May 8 00:53:56.558000 audit[4439]: NETFILTER_CFG table=filter:113 family=2 entries=13 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:56.558000 audit[4439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffdc6d0b0 a2=0 a3=1 items=0 ppid=2106 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:56.572000 audit[4439]: NETFILTER_CFG table=nat:114 family=2 entries=47 op=nft_register_chain pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:56.572000 audit[4439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffffdc6d0b0 a2=0 a3=1 items=0 ppid=2106 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:56.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:56.865000 audit[4372]: AVC avc: denied { watch } for pid=4372 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_53_39.3497835274/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c268 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c268 tclass=file permissive=0 May 8 00:53:56.865000 audit[4372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000167fa0 a2=fc6 a3=0 items=0 ppid=4321 pid=4372 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c268 key=(null) May 8 00:53:56.865000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:53:56.957031 systemd-networkd[1044]: cali8e23798bf5e: Gained IPv6LL May 8 00:53:57.427494 env[1219]: time="2025-05-08T00:53:57.427404194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:57.429419 env[1219]: time="2025-05-08T00:53:57.429380207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:57.430921 env[1219]: time="2025-05-08T00:53:57.430886932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:57.432166 env[1219]: time="2025-05-08T00:53:57.432120326Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:53:57.432612 env[1219]: time="2025-05-08T00:53:57.432570131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 8 00:53:57.441959 env[1219]: time="2025-05-08T00:53:57.440501551Z" level=info msg="CreateContainer within sandbox \"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:53:57.453201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount394555600.mount: Deactivated successfully. May 8 00:53:57.455653 env[1219]: time="2025-05-08T00:53:57.455596366Z" level=info msg="CreateContainer within sandbox \"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0386b01fe0ac7bdc33bbce43cefe33686d860f623c30859c3920d259b46758db\"" May 8 00:53:57.456959 env[1219]: time="2025-05-08T00:53:57.456102822Z" level=info msg="StartContainer for \"0386b01fe0ac7bdc33bbce43cefe33686d860f623c30859c3920d259b46758db\"" May 8 00:53:57.468970 systemd-networkd[1044]: caliaba4935ac5e: Gained IPv6LL May 8 00:53:57.486039 systemd[1]: Started cri-containerd-0386b01fe0ac7bdc33bbce43cefe33686d860f623c30859c3920d259b46758db.scope. May 8 00:53:57.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit: BPF prog-id=201 op=LOAD May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4128 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033383662303166653061633762646333336262636534336365666533 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4128 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033383662303166653061633762646333336262636534336365666533 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit: BPF prog-id=202 op=LOAD May 8 00:53:57.526000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4128 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033383662303166653061633762646333336262636534336365666533 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit: BPF prog-id=203 op=LOAD May 8 00:53:57.526000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4128 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033383662303166653061633762646333336262636534336365666533 May 8 00:53:57.526000 audit: BPF prog-id=203 op=UNLOAD May 8 00:53:57.526000 audit: BPF prog-id=202 op=UNLOAD May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:53:57.526000 audit: BPF prog-id=204 op=LOAD May 8 00:53:57.526000 audit[4453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4128 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033383662303166653061633762646333336262636534336365666533 May 8 00:53:57.538851 kubelet[1955]: E0508 00:53:57.538807 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:57.539221 kubelet[1955]: I0508 00:53:57.539203 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:57.539899 kubelet[1955]: E0508 00:53:57.539880 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:57.547106 env[1219]: time="2025-05-08T00:53:57.547063788Z" level=info msg="StartContainer for \"0386b01fe0ac7bdc33bbce43cefe33686d860f623c30859c3920d259b46758db\" returns successfully" May 8 00:53:57.594000 audit[4482]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:57.594000 audit[4482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe5b96f00 a2=0 a3=1 items=0 ppid=2106 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:57.598000 audit[4482]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:57.598000 audit[4482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe5b96f00 a2=0 a3=1 items=0 ppid=2106 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:57.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:58.556173 kubelet[1955]: I0508 00:53:58.556118 1955 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-67d5cd68b9-z7snx" podStartSLOduration=25.307101997 podStartE2EDuration="27.556103535s" podCreationTimestamp="2025-05-08 00:53:31 +0000 UTC" firstStartedPulling="2025-05-08 00:53:55.184429556 +0000 UTC m=+37.917181507" lastFinishedPulling="2025-05-08 00:53:57.433431094 +0000 UTC m=+40.166183045" observedRunningTime="2025-05-08 00:53:58.555148678 +0000 UTC m=+41.287900629" watchObservedRunningTime="2025-05-08 00:53:58.556103535 +0000 UTC m=+41.288855486" May 8 00:53:59.547129 kubelet[1955]: I0508 00:53:59.547098 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:00.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:00.571949 systemd[1]: Started sshd@12-10.0.0.136:22-10.0.0.1:33380.service. May 8 00:54:00.573113 kernel: kauditd_printk_skb: 613 callbacks suppressed May 8 00:54:00.573180 kernel: audit: type=1130 audit(1746665640.571:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:00.619000 audit[4488]: USER_ACCT pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.621028 sshd[4488]: Accepted publickey for core from 10.0.0.1 port 33380 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:00.621000 audit[4488]: CRED_ACQ pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.624633 sshd[4488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:00.627555 kernel: audit: type=1101 audit(1746665640.619:1378): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.627633 kernel: audit: type=1103 audit(1746665640.621:1379): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.627658 kernel: audit: type=1006 audit(1746665640.621:1380): pid=4488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 8 00:54:00.621000 audit[4488]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8a723e0 a2=3 a3=1 items=0 ppid=1 pid=4488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:00.633271 kernel: audit: type=1300 audit(1746665640.621:1380): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8a723e0 a2=3 a3=1 items=0 ppid=1 pid=4488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:00.621000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:00.635403 kernel: audit: type=1327 audit(1746665640.621:1380): proctitle=737368643A20636F7265205B707269765D May 8 00:54:00.637640 systemd-logind[1206]: New session 13 of user core. May 8 00:54:00.637819 systemd[1]: Started session-13.scope. May 8 00:54:00.642000 audit[4488]: USER_START pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.643000 audit[4490]: CRED_ACQ pid=4490 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.649971 kernel: audit: type=1105 audit(1746665640.642:1381): pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.650062 kernel: audit: type=1103 audit(1746665640.643:1382): pid=4490 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.835503 sshd[4488]: pam_unix(sshd:session): session closed for user core May 8 00:54:00.836000 audit[4488]: USER_END pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.838287 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:54:00.838893 systemd[1]: sshd@12-10.0.0.136:22-10.0.0.1:33380.service: Deactivated successfully. May 8 00:54:00.836000 audit[4488]: CRED_DISP pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.841450 systemd-logind[1206]: Session 13 logged out. Waiting for processes to exit. May 8 00:54:00.842068 systemd-logind[1206]: Removed session 13. May 8 00:54:00.843592 kernel: audit: type=1106 audit(1746665640.836:1383): pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.843649 kernel: audit: type=1104 audit(1746665640.836:1384): pid=4488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:00.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:03.827110 kubelet[1955]: I0508 00:54:03.827072 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:04.362643 kubelet[1955]: I0508 00:54:04.362344 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:04.471000 audit[4545]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:04.471000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe05dcbc0 a2=0 a3=1 items=0 ppid=2106 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:04.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:04.478000 audit[4545]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:04.478000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe05dcbc0 a2=0 a3=1 items=0 ppid=2106 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:04.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:05.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:38130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:05.840523 systemd[1]: Started sshd@13-10.0.0.136:22-10.0.0.1:38130.service. May 8 00:54:05.841382 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:54:05.841424 kernel: audit: type=1130 audit(1746665645.839:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:38130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:05.881000 audit[4549]: USER_ACCT pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.882322 sshd[4549]: Accepted publickey for core from 10.0.0.1 port 38130 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:05.883827 sshd[4549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:05.882000 audit[4549]: CRED_ACQ pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.887680 systemd[1]: Started session-14.scope. May 8 00:54:05.888006 systemd-logind[1206]: New session 14 of user core. May 8 00:54:05.888528 kernel: audit: type=1101 audit(1746665645.881:1389): pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.888588 kernel: audit: type=1103 audit(1746665645.882:1390): pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.888606 kernel: audit: type=1006 audit(1746665645.882:1391): pid=4549 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 8 00:54:05.890401 kernel: audit: type=1300 audit(1746665645.882:1391): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefc66520 a2=3 a3=1 items=0 ppid=1 pid=4549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:05.882000 audit[4549]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefc66520 a2=3 a3=1 items=0 ppid=1 pid=4549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:05.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:05.894803 kernel: audit: type=1327 audit(1746665645.882:1391): proctitle=737368643A20636F7265205B707269765D May 8 00:54:05.894858 kernel: audit: type=1105 audit(1746665645.890:1392): pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.890000 audit[4549]: USER_START pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.892000 audit[4551]: CRED_ACQ pid=4551 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:05.900996 kernel: audit: type=1103 audit(1746665645.892:1393): pid=4551 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:06.024446 sshd[4549]: pam_unix(sshd:session): session closed for user core May 8 00:54:06.024000 audit[4549]: USER_END pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:06.026869 systemd[1]: sshd@13-10.0.0.136:22-10.0.0.1:38130.service: Deactivated successfully. May 8 00:54:06.027611 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:54:06.028162 systemd-logind[1206]: Session 14 logged out. Waiting for processes to exit. May 8 00:54:06.024000 audit[4549]: CRED_DISP pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:06.029083 systemd-logind[1206]: Removed session 14. May 8 00:54:06.031824 kernel: audit: type=1106 audit(1746665646.024:1394): pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:06.031940 kernel: audit: type=1104 audit(1746665646.024:1395): pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:06.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:38130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:11.030191 systemd[1]: Started sshd@14-10.0.0.136:22-10.0.0.1:38140.service. May 8 00:54:11.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:38140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:11.031114 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:11.031188 kernel: audit: type=1130 audit(1746665651.028:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:38140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:11.071000 audit[4571]: USER_ACCT pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.073560 sshd[4571]: Accepted publickey for core from 10.0.0.1 port 38140 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:11.075213 sshd[4571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:11.073000 audit[4571]: CRED_ACQ pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.079687 kernel: audit: type=1101 audit(1746665651.071:1398): pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.079739 kernel: audit: type=1103 audit(1746665651.073:1399): pid=4571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.079866 systemd-logind[1206]: New session 15 of user core. May 8 00:54:11.080442 systemd[1]: Started session-15.scope. May 8 00:54:11.081652 kernel: audit: type=1006 audit(1746665651.073:1400): pid=4571 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 8 00:54:11.081714 kernel: audit: type=1300 audit(1746665651.073:1400): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf92aee0 a2=3 a3=1 items=0 ppid=1 pid=4571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:11.073000 audit[4571]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf92aee0 a2=3 a3=1 items=0 ppid=1 pid=4571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:11.085139 kernel: audit: type=1327 audit(1746665651.073:1400): proctitle=737368643A20636F7265205B707269765D May 8 00:54:11.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:11.082000 audit[4571]: USER_START pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.089588 kernel: audit: type=1105 audit(1746665651.082:1401): pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.089636 kernel: audit: type=1103 audit(1746665651.083:1402): pid=4573 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.083000 audit[4573]: CRED_ACQ pid=4573 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.207408 sshd[4571]: pam_unix(sshd:session): session closed for user core May 8 00:54:11.206000 audit[4571]: USER_END pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.210341 systemd[1]: sshd@14-10.0.0.136:22-10.0.0.1:38140.service: Deactivated successfully. May 8 00:54:11.211140 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:54:11.211643 systemd-logind[1206]: Session 15 logged out. Waiting for processes to exit. May 8 00:54:11.206000 audit[4571]: CRED_DISP pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.212458 systemd-logind[1206]: Removed session 15. May 8 00:54:11.214868 kernel: audit: type=1106 audit(1746665651.206:1403): pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.215050 kernel: audit: type=1104 audit(1746665651.206:1404): pid=4571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:11.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:38140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:14.984000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:14.984000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005490e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:14.984000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:14.984000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:14.984000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001bfab10 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:14.984000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:15.013000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.013000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.013000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.013000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400a6b62a0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:15.013000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400a2866f0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:15.013000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400ca9e840 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:15.027000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.027000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400a6b6330 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.027000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:15.042000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.042000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400a6af3e0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:15.059000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:15.059000 audit[1827]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400a2197e0 a2=fc6 a3=0 items=0 ppid=1674 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c801 key=(null) May 8 00:54:15.059000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:54:16.212757 systemd[1]: Started sshd@15-10.0.0.136:22-10.0.0.1:46578.service. May 8 00:54:16.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.216464 kernel: kauditd_printk_skb: 25 callbacks suppressed May 8 00:54:16.216548 kernel: audit: type=1130 audit(1746665656.212:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.250000 audit[4586]: USER_ACCT pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.251550 sshd[4586]: Accepted publickey for core from 10.0.0.1 port 46578 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:16.253077 sshd[4586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:16.251000 audit[4586]: CRED_ACQ pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.257325 systemd[1]: Started session-16.scope. May 8 00:54:16.257733 kernel: audit: type=1101 audit(1746665656.250:1415): pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.257770 kernel: audit: type=1103 audit(1746665656.251:1416): pid=4586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.257790 kernel: audit: type=1006 audit(1746665656.251:1417): pid=4586 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 8 00:54:16.257479 systemd-logind[1206]: New session 16 of user core. May 8 00:54:16.251000 audit[4586]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb110420 a2=3 a3=1 items=0 ppid=1 pid=4586 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.263002 kernel: audit: type=1300 audit(1746665656.251:1417): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb110420 a2=3 a3=1 items=0 ppid=1 pid=4586 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.263074 kernel: audit: type=1327 audit(1746665656.251:1417): proctitle=737368643A20636F7265205B707269765D May 8 00:54:16.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:16.260000 audit[4586]: USER_START pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.267538 kernel: audit: type=1105 audit(1746665656.260:1418): pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.267589 kernel: audit: type=1103 audit(1746665656.261:1419): pid=4588 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.261000 audit[4588]: CRED_ACQ pid=4588 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.383645 sshd[4586]: pam_unix(sshd:session): session closed for user core May 8 00:54:16.383000 audit[4586]: USER_END pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.387625 systemd[1]: Started sshd@16-10.0.0.136:22-10.0.0.1:46594.service. May 8 00:54:16.384000 audit[4586]: CRED_DISP pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.391731 kernel: audit: type=1106 audit(1746665656.383:1420): pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.391949 kernel: audit: type=1104 audit(1746665656.384:1421): pid=4586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:46594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.395490 systemd[1]: sshd@15-10.0.0.136:22-10.0.0.1:46578.service: Deactivated successfully. May 8 00:54:16.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.396219 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:54:16.396803 systemd-logind[1206]: Session 16 logged out. Waiting for processes to exit. May 8 00:54:16.397470 systemd-logind[1206]: Removed session 16. May 8 00:54:16.429000 audit[4598]: USER_ACCT pid=4598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.430354 sshd[4598]: Accepted publickey for core from 10.0.0.1 port 46594 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:16.430000 audit[4598]: CRED_ACQ pid=4598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.430000 audit[4598]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd74edea0 a2=3 a3=1 items=0 ppid=1 pid=4598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:16.431473 sshd[4598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:16.434892 systemd-logind[1206]: New session 17 of user core. May 8 00:54:16.435437 systemd[1]: Started session-17.scope. May 8 00:54:16.437000 audit[4598]: USER_START pid=4598 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.438000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.640639 sshd[4598]: pam_unix(sshd:session): session closed for user core May 8 00:54:16.643000 audit[4598]: USER_END pid=4598 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.643000 audit[4598]: CRED_DISP pid=4598 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.644634 systemd[1]: Started sshd@17-10.0.0.136:22-10.0.0.1:46600.service. May 8 00:54:16.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:46600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.646987 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:54:16.647529 systemd-logind[1206]: Session 17 logged out. Waiting for processes to exit. May 8 00:54:16.647636 systemd[1]: sshd@16-10.0.0.136:22-10.0.0.1:46594.service: Deactivated successfully. May 8 00:54:16.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:46594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:16.648532 systemd-logind[1206]: Removed session 17. May 8 00:54:16.683000 audit[4609]: USER_ACCT pid=4609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.684365 sshd[4609]: Accepted publickey for core from 10.0.0.1 port 46600 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:16.684000 audit[4609]: CRED_ACQ pid=4609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.684000 audit[4609]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6ac7a30 a2=3 a3=1 items=0 ppid=1 pid=4609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:16.684000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:16.685964 sshd[4609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:16.689234 systemd-logind[1206]: New session 18 of user core. May 8 00:54:16.690044 systemd[1]: Started session-18.scope. May 8 00:54:16.694000 audit[4609]: USER_START pid=4609 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:16.695000 audit[4612]: CRED_ACQ pid=4612 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:17.353169 env[1219]: time="2025-05-08T00:54:17.353118082Z" level=info msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.394 [WARNING][4642] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"803dfaf5-ed95-4afa-bd92-f764f51ebe32", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd", Pod:"coredns-6f6b679f8f-tpmsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6465b60d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.395 [INFO][4642] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.395 [INFO][4642] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" iface="eth0" netns="" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.395 [INFO][4642] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.395 [INFO][4642] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.455 [INFO][4652] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.455 [INFO][4652] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.455 [INFO][4652] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.464 [WARNING][4652] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.464 [INFO][4652] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.466 [INFO][4652] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.471818 env[1219]: 2025-05-08 00:54:17.470 [INFO][4642] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.472267 env[1219]: time="2025-05-08T00:54:17.471867765Z" level=info msg="TearDown network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" successfully" May 8 00:54:17.472267 env[1219]: time="2025-05-08T00:54:17.471901089Z" level=info msg="StopPodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" returns successfully" May 8 00:54:17.472478 env[1219]: time="2025-05-08T00:54:17.472440163Z" level=info msg="RemovePodSandbox for \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" May 8 00:54:17.472512 env[1219]: time="2025-05-08T00:54:17.472479769Z" level=info msg="Forcibly stopping sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\"" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.506 [WARNING][4676] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"803dfaf5-ed95-4afa-bd92-f764f51ebe32", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"78fdc3b11dd356923aa87d8fd9f8373105d0e73b7c939ec6f6f5567c5ca325cd", Pod:"coredns-6f6b679f8f-tpmsp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d6465b60d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.507 [INFO][4676] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.507 [INFO][4676] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" iface="eth0" netns="" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.507 [INFO][4676] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.507 [INFO][4676] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.533 [INFO][4684] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.533 [INFO][4684] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.533 [INFO][4684] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.544 [WARNING][4684] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.544 [INFO][4684] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" HandleID="k8s-pod-network.41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" Workload="localhost-k8s-coredns--6f6b679f8f--tpmsp-eth0" May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.555 [INFO][4684] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.558953 env[1219]: 2025-05-08 00:54:17.557 [INFO][4676] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04" May 8 00:54:17.559392 env[1219]: time="2025-05-08T00:54:17.558976298Z" level=info msg="TearDown network for sandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" successfully" May 8 00:54:17.568567 env[1219]: time="2025-05-08T00:54:17.568514129Z" level=info msg="RemovePodSandbox \"41c57a114d496d10b596a61e65b287cbd9510a9a427c15f30aef457e4553eb04\" returns successfully" May 8 00:54:17.569052 env[1219]: time="2025-05-08T00:54:17.569016358Z" level=info msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.609 [WARNING][4708] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0", GenerateName:"calico-kube-controllers-67d5cd68b9-", Namespace:"calico-system", SelfLink:"", UID:"fdf92870-cefa-4485-a6de-9c7e16d2b0d2", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"67d5cd68b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068", Pod:"calico-kube-controllers-67d5cd68b9-z7snx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4378b4794c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.609 [INFO][4708] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.609 [INFO][4708] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" iface="eth0" netns="" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.609 [INFO][4708] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.609 [INFO][4708] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.628 [INFO][4716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.628 [INFO][4716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.628 [INFO][4716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.636 [WARNING][4716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.636 [INFO][4716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.637 [INFO][4716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.640937 env[1219]: 2025-05-08 00:54:17.639 [INFO][4708] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.642421 env[1219]: time="2025-05-08T00:54:17.640900439Z" level=info msg="TearDown network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" successfully" May 8 00:54:17.642471 env[1219]: time="2025-05-08T00:54:17.642423089Z" level=info msg="StopPodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" returns successfully" May 8 00:54:17.642965 env[1219]: time="2025-05-08T00:54:17.642934599Z" level=info msg="RemovePodSandbox for \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" May 8 00:54:17.643017 env[1219]: time="2025-05-08T00:54:17.642971764Z" level=info msg="Forcibly stopping sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\"" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.679 [WARNING][4739] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0", GenerateName:"calico-kube-controllers-67d5cd68b9-", Namespace:"calico-system", SelfLink:"", UID:"fdf92870-cefa-4485-a6de-9c7e16d2b0d2", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"67d5cd68b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"571a5743ba5814002b960b1ab6063284c86e845d77c0a264724eb0e10d5d0068", Pod:"calico-kube-controllers-67d5cd68b9-z7snx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4378b4794c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.679 [INFO][4739] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.679 [INFO][4739] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" iface="eth0" netns="" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.679 [INFO][4739] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.679 [INFO][4739] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.697 [INFO][4748] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.697 [INFO][4748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.697 [INFO][4748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.707 [WARNING][4748] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.707 [INFO][4748] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" HandleID="k8s-pod-network.5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" Workload="localhost-k8s-calico--kube--controllers--67d5cd68b9--z7snx-eth0" May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.712 [INFO][4748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.715984 env[1219]: 2025-05-08 00:54:17.714 [INFO][4739] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da" May 8 00:54:17.716540 env[1219]: time="2025-05-08T00:54:17.716018445Z" level=info msg="TearDown network for sandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" successfully" May 8 00:54:17.718653 env[1219]: time="2025-05-08T00:54:17.718622963Z" level=info msg="RemovePodSandbox \"5f371b33d699e93992ee2746525f5d8717bef5055f59dc2126053d926ee8c8da\" returns successfully" May 8 00:54:17.719117 env[1219]: time="2025-05-08T00:54:17.719092667Z" level=info msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.753 [WARNING][4771] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ttxxq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f0773fa0-2f79-4143-a60d-2de26f98e45d", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3", Pod:"csi-node-driver-ttxxq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali538e13f3ce3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.753 [INFO][4771] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.753 [INFO][4771] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" iface="eth0" netns="" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.754 [INFO][4771] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.754 [INFO][4771] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.773 [INFO][4779] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.773 [INFO][4779] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.773 [INFO][4779] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.782 [WARNING][4779] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.782 [INFO][4779] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.784 [INFO][4779] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.787386 env[1219]: 2025-05-08 00:54:17.785 [INFO][4771] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.787987 env[1219]: time="2025-05-08T00:54:17.787419979Z" level=info msg="TearDown network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" successfully" May 8 00:54:17.787987 env[1219]: time="2025-05-08T00:54:17.787450624Z" level=info msg="StopPodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" returns successfully" May 8 00:54:17.788042 env[1219]: time="2025-05-08T00:54:17.787982657Z" level=info msg="RemovePodSandbox for \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" May 8 00:54:17.788065 env[1219]: time="2025-05-08T00:54:17.788025383Z" level=info msg="Forcibly stopping sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\"" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.826 [WARNING][4802] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ttxxq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f0773fa0-2f79-4143-a60d-2de26f98e45d", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"246e2070eebd72f7d02a2b39880b8293663ff778a91596a374759355d58431c3", Pod:"csi-node-driver-ttxxq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali538e13f3ce3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.826 [INFO][4802] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.826 [INFO][4802] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" iface="eth0" netns="" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.826 [INFO][4802] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.826 [INFO][4802] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.886 [INFO][4811] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.886 [INFO][4811] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.886 [INFO][4811] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.894 [WARNING][4811] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.895 [INFO][4811] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" HandleID="k8s-pod-network.6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" Workload="localhost-k8s-csi--node--driver--ttxxq-eth0" May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.906 [INFO][4811] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:17.911160 env[1219]: 2025-05-08 00:54:17.907 [INFO][4802] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff" May 8 00:54:17.911160 env[1219]: time="2025-05-08T00:54:17.909460435Z" level=info msg="TearDown network for sandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" successfully" May 8 00:54:17.915568 env[1219]: time="2025-05-08T00:54:17.915529469Z" level=info msg="RemovePodSandbox \"6d7839fe12c0cb3e0a1e5cfdd3cbc476781e76f19ce717ca228dd5bc0e90beff\" returns successfully" May 8 00:54:17.916083 env[1219]: time="2025-05-08T00:54:17.916056221Z" level=info msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:17.968 [WARNING][4834] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"545892ca-5c8d-4a5b-a50b-fc5743c8a4df", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3", Pod:"calico-apiserver-5cf85bd5f9-6g6hv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliaba4935ac5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:17.971 [INFO][4834] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:17.971 [INFO][4834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" iface="eth0" netns="" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:17.971 [INFO][4834] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:17.972 [INFO][4834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.004 [INFO][4843] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.004 [INFO][4843] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.004 [INFO][4843] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.013 [WARNING][4843] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.013 [INFO][4843] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.014 [INFO][4843] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.019115 env[1219]: 2025-05-08 00:54:18.017 [INFO][4834] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.019708 env[1219]: time="2025-05-08T00:54:18.019663321Z" level=info msg="TearDown network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" successfully" May 8 00:54:18.019779 env[1219]: time="2025-05-08T00:54:18.019763375Z" level=info msg="StopPodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" returns successfully" May 8 00:54:18.020312 env[1219]: time="2025-05-08T00:54:18.020266083Z" level=info msg="RemovePodSandbox for \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" May 8 00:54:18.020399 env[1219]: time="2025-05-08T00:54:18.020308969Z" level=info msg="Forcibly stopping sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\"" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.063 [WARNING][4866] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"545892ca-5c8d-4a5b-a50b-fc5743c8a4df", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dea07e1c00bb5643e18665189b32f7c1857a85f812e692e9f881217217c05c3", Pod:"calico-apiserver-5cf85bd5f9-6g6hv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliaba4935ac5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.063 [INFO][4866] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.063 [INFO][4866] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" iface="eth0" netns="" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.063 [INFO][4866] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.063 [INFO][4866] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.083 [INFO][4875] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.083 [INFO][4875] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.083 [INFO][4875] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.092 [WARNING][4875] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.092 [INFO][4875] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" HandleID="k8s-pod-network.e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--6g6hv-eth0" May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.096 [INFO][4875] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.108393 env[1219]: 2025-05-08 00:54:18.101 [INFO][4866] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9" May 8 00:54:18.109004 env[1219]: time="2025-05-08T00:54:18.108966447Z" level=info msg="TearDown network for sandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" successfully" May 8 00:54:18.114268 env[1219]: time="2025-05-08T00:54:18.114231924Z" level=info msg="RemovePodSandbox \"e36ea4f8a10a971d152b880763b37309e90075bcca45e2a050e1b0d529bd25f9\" returns successfully" May 8 00:54:18.114886 env[1219]: time="2025-05-08T00:54:18.114818364Z" level=info msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.157 [WARNING][4901] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"25c7ff6e-341a-4235-8805-abda8ab8a7c8", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d", Pod:"coredns-6f6b679f8f-2n5j2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e23798bf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.158 [INFO][4901] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.158 [INFO][4901] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" iface="eth0" netns="" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.158 [INFO][4901] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.158 [INFO][4901] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.185 [INFO][4909] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.185 [INFO][4909] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.185 [INFO][4909] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.196 [WARNING][4909] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.196 [INFO][4909] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.202 [INFO][4909] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.205678 env[1219]: 2025-05-08 00:54:18.203 [INFO][4901] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.205678 env[1219]: time="2025-05-08T00:54:18.205635776Z" level=info msg="TearDown network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" successfully" May 8 00:54:18.206167 env[1219]: time="2025-05-08T00:54:18.205685623Z" level=info msg="StopPodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" returns successfully" May 8 00:54:18.206628 env[1219]: time="2025-05-08T00:54:18.206599988Z" level=info msg="RemovePodSandbox for \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" May 8 00:54:18.206770 env[1219]: time="2025-05-08T00:54:18.206728645Z" level=info msg="Forcibly stopping sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\"" May 8 00:54:18.289000 audit[4949]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:18.289000 audit[4949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff73e8110 a2=0 a3=1 items=0 ppid=2106 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:18.296000 audit[4949]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:18.296000 audit[4949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff73e8110 a2=0 a3=1 items=0 ppid=2106 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:18.304243 sshd[4609]: pam_unix(sshd:session): session closed for user core May 8 00:54:18.303000 audit[4609]: USER_END pid=4609 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.303000 audit[4609]: CRED_DISP pid=4609 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:46610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:18.307487 systemd[1]: Started sshd@18-10.0.0.136:22-10.0.0.1:46610.service. May 8 00:54:18.310307 systemd[1]: sshd@17-10.0.0.136:22-10.0.0.1:46600.service: Deactivated successfully. May 8 00:54:18.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:46600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:18.311035 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:54:18.311875 systemd-logind[1206]: Session 18 logged out. Waiting for processes to exit. May 8 00:54:18.313120 systemd-logind[1206]: Removed session 18. May 8 00:54:18.315000 audit[4955]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:18.315000 audit[4955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff01e4ae0 a2=0 a3=1 items=0 ppid=2106 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:18.322000 audit[4955]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:18.322000 audit[4955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff01e4ae0 a2=0 a3=1 items=0 ppid=2106 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.253 [WARNING][4933] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"25c7ff6e-341a-4235-8805-abda8ab8a7c8", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec3341a6cba5eec6e0766f3499ed7fb9a9a58eff47bee0af6d2b582e492ba7d", Pod:"coredns-6f6b679f8f-2n5j2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e23798bf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.253 [INFO][4933] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.253 [INFO][4933] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" iface="eth0" netns="" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.253 [INFO][4933] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.253 [INFO][4933] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.311 [INFO][4941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.311 [INFO][4941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.311 [INFO][4941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.327 [WARNING][4941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.327 [INFO][4941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" HandleID="k8s-pod-network.ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" Workload="localhost-k8s-coredns--6f6b679f8f--2n5j2-eth0" May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.337 [INFO][4941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.344900 env[1219]: 2025-05-08 00:54:18.342 [INFO][4933] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f" May 8 00:54:18.347146 env[1219]: time="2025-05-08T00:54:18.347109129Z" level=info msg="TearDown network for sandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" successfully" May 8 00:54:18.350218 env[1219]: time="2025-05-08T00:54:18.350180868Z" level=info msg="RemovePodSandbox \"ddaf183d5ecd84ea59c04f0567ad878e16fb5c99222cee3bb738754789813a3f\" returns successfully" May 8 00:54:18.350903 env[1219]: time="2025-05-08T00:54:18.350876843Z" level=info msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" May 8 00:54:18.349000 audit[4953]: USER_ACCT pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.352026 sshd[4953]: Accepted publickey for core from 10.0.0.1 port 46610 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:18.351000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.351000 audit[4953]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdffb5f30 a2=3 a3=1 items=0 ppid=1 pid=4953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:18.353318 sshd[4953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:18.357030 systemd-logind[1206]: New session 19 of user core. May 8 00:54:18.357894 systemd[1]: Started session-19.scope. May 8 00:54:18.360000 audit[4953]: USER_START pid=4953 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.361000 audit[4973]: CRED_ACQ pid=4973 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.391 [WARNING][4974] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"97197ff1-e864-48de-b3d3-d882cda2a97f", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107", Pod:"calico-apiserver-5cf85bd5f9-rb2f5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib69b67fda42", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.391 [INFO][4974] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.391 [INFO][4974] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" iface="eth0" netns="" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.391 [INFO][4974] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.391 [INFO][4974] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.409 [INFO][4984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.409 [INFO][4984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.409 [INFO][4984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.420 [WARNING][4984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.420 [INFO][4984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.422 [INFO][4984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.425747 env[1219]: 2025-05-08 00:54:18.424 [INFO][4974] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.426408 env[1219]: time="2025-05-08T00:54:18.425772126Z" level=info msg="TearDown network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" successfully" May 8 00:54:18.426408 env[1219]: time="2025-05-08T00:54:18.425804450Z" level=info msg="StopPodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" returns successfully" May 8 00:54:18.426905 env[1219]: time="2025-05-08T00:54:18.426863554Z" level=info msg="RemovePodSandbox for \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" May 8 00:54:18.426995 env[1219]: time="2025-05-08T00:54:18.426906560Z" level=info msg="Forcibly stopping sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\"" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.464 [WARNING][5011] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0", GenerateName:"calico-apiserver-5cf85bd5f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"97197ff1-e864-48de-b3d3-d882cda2a97f", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cf85bd5f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75baef0ef083b350427eca2e2c20e9545253dbc83970cada3054e4f96e469107", Pod:"calico-apiserver-5cf85bd5f9-rb2f5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib69b67fda42", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.465 [INFO][5011] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.465 [INFO][5011] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" iface="eth0" netns="" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.465 [INFO][5011] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.465 [INFO][5011] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.485 [INFO][5020] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.485 [INFO][5020] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.485 [INFO][5020] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.494 [WARNING][5020] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.494 [INFO][5020] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" HandleID="k8s-pod-network.bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" Workload="localhost-k8s-calico--apiserver--5cf85bd5f9--rb2f5-eth0" May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.496 [INFO][5020] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:54:18.501386 env[1219]: 2025-05-08 00:54:18.498 [INFO][5011] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571" May 8 00:54:18.501815 env[1219]: time="2025-05-08T00:54:18.501416711Z" level=info msg="TearDown network for sandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" successfully" May 8 00:54:18.504341 env[1219]: time="2025-05-08T00:54:18.504305104Z" level=info msg="RemovePodSandbox \"bbca4347e0775fd09c216efa80669cb75e91d2d7482b7f8c954bd69c77293571\" returns successfully" May 8 00:54:18.741935 sshd[4953]: pam_unix(sshd:session): session closed for user core May 8 00:54:18.741000 audit[4953]: USER_END pid=4953 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.741000 audit[4953]: CRED_DISP pid=4953 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.745925 systemd[1]: Started sshd@19-10.0.0.136:22-10.0.0.1:46624.service. May 8 00:54:18.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:18.751033 systemd-logind[1206]: Session 19 logged out. Waiting for processes to exit. May 8 00:54:18.751199 systemd[1]: sshd@18-10.0.0.136:22-10.0.0.1:46610.service: Deactivated successfully. May 8 00:54:18.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:46610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:18.751911 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:54:18.752502 systemd-logind[1206]: Removed session 19. May 8 00:54:18.781000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.783253 sshd[5031]: Accepted publickey for core from 10.0.0.1 port 46624 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:18.782000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.782000 audit[5031]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4d88010 a2=3 a3=1 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:18.782000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:18.784411 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:18.787359 systemd-logind[1206]: New session 20 of user core. May 8 00:54:18.788306 systemd[1]: Started session-20.scope. May 8 00:54:18.789000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.790000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.912375 sshd[5031]: pam_unix(sshd:session): session closed for user core May 8 00:54:18.911000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.911000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:18.915070 systemd[1]: sshd@19-10.0.0.136:22-10.0.0.1:46624.service: Deactivated successfully. May 8 00:54:18.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:18.915791 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:54:18.916291 systemd-logind[1206]: Session 20 logged out. Waiting for processes to exit. May 8 00:54:18.917065 systemd-logind[1206]: Removed session 20. May 8 00:54:19.952000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:19.952000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000481740 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:19.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:19.952000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:19.952000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:19.952000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000481780 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:19.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:19.952000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015fffc0 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:19.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:19.953000 audit[1845]: AVC avc: denied { watch } for pid=1845 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:54:19.953000 audit[1845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000166400 a2=fc6 a3=0 items=0 ppid=1671 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c983 key=(null) May 8 00:54:19.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:54:22.266391 kubelet[1955]: I0508 00:54:22.266346 1955 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:54:22.299000 audit[5069]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.302687 kernel: kauditd_printk_skb: 69 callbacks suppressed May 8 00:54:22.302772 kernel: audit: type=1325 audit(1746665662.299:1467): table=filter:123 family=2 entries=32 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.302798 kernel: audit: type=1300 audit(1746665662.299:1467): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff6bb7370 a2=0 a3=1 items=0 ppid=2106 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.299000 audit[5069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff6bb7370 a2=0 a3=1 items=0 ppid=2106 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:22.307936 kernel: audit: type=1327 audit(1746665662.299:1467): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:22.310000 audit[5069]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.310000 audit[5069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6bb7370 a2=0 a3=1 items=0 ppid=2106 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.317268 kernel: audit: type=1325 audit(1746665662.310:1468): table=nat:124 family=2 entries=34 op=nft_register_chain pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:22.317309 kernel: audit: type=1300 audit(1746665662.310:1468): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6bb7370 a2=0 a3=1 items=0 ppid=2106 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:22.317328 kernel: audit: type=1327 audit(1746665662.310:1468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:22.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:23.830000 audit[5071]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:23.830000 audit[5071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffc0f41c0 a2=0 a3=1 items=0 ppid=2106 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:23.836926 kernel: audit: type=1325 audit(1746665663.830:1469): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:23.836986 kernel: audit: type=1300 audit(1746665663.830:1469): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffc0f41c0 a2=0 a3=1 items=0 ppid=2106 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:23.837007 kernel: audit: type=1327 audit(1746665663.830:1469): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:23.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:23.845000 audit[5071]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:23.845000 audit[5071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc0f41c0 a2=0 a3=1 items=0 ppid=2106 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:23.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:54:23.849865 kernel: audit: type=1325 audit(1746665663.845:1470): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:54:23.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:23.917026 systemd[1]: Started sshd@20-10.0.0.136:22-10.0.0.1:54686.service. May 8 00:54:23.953000 audit[5074]: USER_ACCT pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:23.954846 sshd[5074]: Accepted publickey for core from 10.0.0.1 port 54686 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:23.955000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:23.955000 audit[5074]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8cc3c30 a2=3 a3=1 items=0 ppid=1 pid=5074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:23.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:23.956404 sshd[5074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:23.960707 systemd-logind[1206]: New session 21 of user core. May 8 00:54:23.960719 systemd[1]: Started session-21.scope. May 8 00:54:23.964000 audit[5074]: USER_START pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:23.965000 audit[5076]: CRED_ACQ pid=5076 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:24.084389 sshd[5074]: pam_unix(sshd:session): session closed for user core May 8 00:54:24.085000 audit[5074]: USER_END pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:24.086000 audit[5074]: CRED_DISP pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:24.088254 systemd[1]: sshd@20-10.0.0.136:22-10.0.0.1:54686.service: Deactivated successfully. May 8 00:54:24.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:24.089031 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:54:24.089528 systemd-logind[1206]: Session 21 logged out. Waiting for processes to exit. May 8 00:54:24.090342 systemd-logind[1206]: Removed session 21. May 8 00:54:29.088173 systemd[1]: Started sshd@21-10.0.0.136:22-10.0.0.1:54692.service. May 8 00:54:29.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:29.089380 kernel: kauditd_printk_skb: 13 callbacks suppressed May 8 00:54:29.089434 kernel: audit: type=1130 audit(1746665669.087:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:29.123000 audit[5098]: USER_ACCT pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.124865 sshd[5098]: Accepted publickey for core from 10.0.0.1 port 54692 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:29.126424 sshd[5098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:29.125000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.131095 kernel: audit: type=1101 audit(1746665669.123:1481): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.131154 kernel: audit: type=1103 audit(1746665669.125:1482): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.133222 kernel: audit: type=1006 audit(1746665669.125:1483): pid=5098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 8 00:54:29.125000 audit[5098]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0c6fcb0 a2=3 a3=1 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:29.137080 kernel: audit: type=1300 audit(1746665669.125:1483): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0c6fcb0 a2=3 a3=1 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:29.137136 kernel: audit: type=1327 audit(1746665669.125:1483): proctitle=737368643A20636F7265205B707269765D May 8 00:54:29.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:29.136735 systemd[1]: Started session-22.scope. May 8 00:54:29.137368 systemd-logind[1206]: New session 22 of user core. May 8 00:54:29.140000 audit[5098]: USER_START pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.141000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.147871 kernel: audit: type=1105 audit(1746665669.140:1484): pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.147920 kernel: audit: type=1103 audit(1746665669.141:1485): pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.247499 sshd[5098]: pam_unix(sshd:session): session closed for user core May 8 00:54:29.248000 audit[5098]: USER_END pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.251369 systemd[1]: sshd@21-10.0.0.136:22-10.0.0.1:54692.service: Deactivated successfully. May 8 00:54:29.252114 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:54:29.252690 systemd-logind[1206]: Session 22 logged out. Waiting for processes to exit. May 8 00:54:29.253417 systemd-logind[1206]: Removed session 22. May 8 00:54:29.256409 kernel: audit: type=1106 audit(1746665669.248:1486): pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.256460 kernel: audit: type=1104 audit(1746665669.249:1487): pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.249000 audit[5098]: CRED_DISP pid=5098 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:29.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:32.332101 kubelet[1955]: E0508 00:54:32.332047 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:32.332417 kubelet[1955]: E0508 00:54:32.332235 1955 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:54:33.844884 systemd[1]: run-containerd-runc-k8s.io-0386b01fe0ac7bdc33bbce43cefe33686d860f623c30859c3920d259b46758db-runc.2ukGBe.mount: Deactivated successfully. May 8 00:54:34.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:38178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:34.252143 systemd[1]: Started sshd@22-10.0.0.136:22-10.0.0.1:38178.service. May 8 00:54:34.253037 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:54:34.253091 kernel: audit: type=1130 audit(1746665674.251:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:38178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:54:34.294000 audit[5131]: USER_ACCT pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.295239 sshd[5131]: Accepted publickey for core from 10.0.0.1 port 38178 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:54:34.297328 sshd[5131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:54:34.296000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.301666 kernel: audit: type=1101 audit(1746665674.294:1490): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.301740 kernel: audit: type=1103 audit(1746665674.296:1491): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.304189 kernel: audit: type=1006 audit(1746665674.296:1492): pid=5131 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 8 00:54:34.304248 kernel: audit: type=1300 audit(1746665674.296:1492): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7c817f0 a2=3 a3=1 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:34.296000 audit[5131]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7c817f0 a2=3 a3=1 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:54:34.308048 kernel: audit: type=1327 audit(1746665674.296:1492): proctitle=737368643A20636F7265205B707269765D May 8 00:54:34.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:54:34.307473 systemd-logind[1206]: New session 23 of user core. May 8 00:54:34.307943 systemd[1]: Started session-23.scope. May 8 00:54:34.314000 audit[5131]: USER_START pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.316000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.322208 kernel: audit: type=1105 audit(1746665674.314:1493): pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.322283 kernel: audit: type=1103 audit(1746665674.316:1494): pid=5133 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.462254 sshd[5131]: pam_unix(sshd:session): session closed for user core May 8 00:54:34.462000 audit[5131]: USER_END pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.465262 systemd-logind[1206]: Session 23 logged out. Waiting for processes to exit. May 8 00:54:34.465546 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:54:34.466338 systemd[1]: sshd@22-10.0.0.136:22-10.0.0.1:38178.service: Deactivated successfully. May 8 00:54:34.467119 systemd-logind[1206]: Removed session 23. May 8 00:54:34.462000 audit[5131]: CRED_DISP pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.470735 kernel: audit: type=1106 audit(1746665674.462:1495): pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.470797 kernel: audit: type=1104 audit(1746665674.462:1496): pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:54:34.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:38178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'