May 10 00:44:51.925607 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:44:51.925626 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:51.925637 kernel: BIOS-provided physical RAM map: May 10 00:44:51.925644 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 00:44:51.925651 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 00:44:51.925671 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 00:44:51.925680 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 10 00:44:51.925688 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 10 00:44:51.925715 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:44:51.925721 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 10 00:44:51.925727 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 00:44:51.925732 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 00:44:51.925751 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 10 00:44:51.925757 kernel: NX (Execute Disable) protection: active May 10 00:44:51.925765 kernel: SMBIOS 2.8 present. May 10 00:44:51.925773 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 10 00:44:51.925781 kernel: Hypervisor detected: KVM May 10 00:44:51.925789 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:44:51.925797 kernel: kvm-clock: cpu 0, msr 26196001, primary cpu clock May 10 00:44:51.925804 kernel: kvm-clock: using sched offset of 3228804343 cycles May 10 00:44:51.925811 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:44:51.925817 kernel: tsc: Detected 2794.748 MHz processor May 10 00:44:51.925824 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:44:51.925831 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:44:51.925838 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 10 00:44:51.925844 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:44:51.925850 kernel: Using GB pages for direct mapping May 10 00:44:51.925856 kernel: ACPI: Early table checksum verification disabled May 10 00:44:51.925862 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 10 00:44:51.925868 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925874 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925880 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925887 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 10 00:44:51.925893 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925899 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925907 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925915 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:51.925923 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 10 00:44:51.925930 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 10 00:44:51.925937 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 10 00:44:51.925946 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 10 00:44:51.925953 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 10 00:44:51.925959 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 10 00:44:51.925965 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 10 00:44:51.925972 kernel: No NUMA configuration found May 10 00:44:51.925978 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 10 00:44:51.925986 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 10 00:44:51.925992 kernel: Zone ranges: May 10 00:44:51.925999 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:44:51.926007 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 10 00:44:51.926015 kernel: Normal empty May 10 00:44:51.926024 kernel: Movable zone start for each node May 10 00:44:51.926033 kernel: Early memory node ranges May 10 00:44:51.926041 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 00:44:51.926047 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 10 00:44:51.926054 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 10 00:44:51.926062 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:44:51.926068 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 00:44:51.926075 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 10 00:44:51.926081 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:44:51.926088 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:44:51.926094 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:44:51.926101 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:44:51.926107 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:44:51.926113 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:44:51.926121 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:44:51.926128 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:44:51.926134 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:44:51.926140 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:44:51.926147 kernel: TSC deadline timer available May 10 00:44:51.926153 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:44:51.926160 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:44:51.926166 kernel: kvm-guest: setup PV sched yield May 10 00:44:51.926172 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 10 00:44:51.926180 kernel: Booting paravirtualized kernel on KVM May 10 00:44:51.926186 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:44:51.926193 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:44:51.926199 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:44:51.926206 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:44:51.926212 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:44:51.926218 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:44:51.926225 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 10 00:44:51.926231 kernel: kvm-guest: PV spinlocks enabled May 10 00:44:51.926239 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:44:51.926245 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 10 00:44:51.926252 kernel: Policy zone: DMA32 May 10 00:44:51.926259 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:51.926266 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:44:51.926273 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:44:51.926279 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:44:51.926286 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:44:51.926294 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 10 00:44:51.926300 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:44:51.926307 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:44:51.926313 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:44:51.926319 kernel: rcu: Hierarchical RCU implementation. May 10 00:44:51.926326 kernel: rcu: RCU event tracing is enabled. May 10 00:44:51.926333 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:44:51.926340 kernel: Rude variant of Tasks RCU enabled. May 10 00:44:51.926346 kernel: Tracing variant of Tasks RCU enabled. May 10 00:44:51.926354 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:44:51.926360 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:44:51.926367 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:44:51.926373 kernel: random: crng init done May 10 00:44:51.926379 kernel: Console: colour VGA+ 80x25 May 10 00:44:51.926386 kernel: printk: console [ttyS0] enabled May 10 00:44:51.926392 kernel: ACPI: Core revision 20210730 May 10 00:44:51.926399 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:44:51.926405 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:44:51.926413 kernel: x2apic enabled May 10 00:44:51.926419 kernel: Switched APIC routing to physical x2apic. May 10 00:44:51.926426 kernel: kvm-guest: setup PV IPIs May 10 00:44:51.926432 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:44:51.926439 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:44:51.926445 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:44:51.926452 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:44:51.926458 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:44:51.926465 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:44:51.926477 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:44:51.926484 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:44:51.926491 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:44:51.926498 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:44:51.926505 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:44:51.926512 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:44:51.926519 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:44:51.926526 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:44:51.926533 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:44:51.926541 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:44:51.926547 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:44:51.926554 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:44:51.926561 kernel: Freeing SMP alternatives memory: 32K May 10 00:44:51.926568 kernel: pid_max: default: 32768 minimum: 301 May 10 00:44:51.926575 kernel: LSM: Security Framework initializing May 10 00:44:51.926581 kernel: SELinux: Initializing. May 10 00:44:51.926588 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:44:51.926596 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:44:51.926603 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:44:51.926610 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:44:51.926617 kernel: ... version: 0 May 10 00:44:51.926623 kernel: ... bit width: 48 May 10 00:44:51.926630 kernel: ... generic registers: 6 May 10 00:44:51.926637 kernel: ... value mask: 0000ffffffffffff May 10 00:44:51.926644 kernel: ... max period: 00007fffffffffff May 10 00:44:51.926650 kernel: ... fixed-purpose events: 0 May 10 00:44:51.926670 kernel: ... event mask: 000000000000003f May 10 00:44:51.926679 kernel: signal: max sigframe size: 1776 May 10 00:44:51.926688 kernel: rcu: Hierarchical SRCU implementation. May 10 00:44:51.926696 kernel: smp: Bringing up secondary CPUs ... May 10 00:44:51.926716 kernel: x86: Booting SMP configuration: May 10 00:44:51.926725 kernel: .... node #0, CPUs: #1 May 10 00:44:51.926734 kernel: kvm-clock: cpu 1, msr 26196041, secondary cpu clock May 10 00:44:51.926742 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:44:51.926751 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 10 00:44:51.926762 kernel: #2 May 10 00:44:51.926771 kernel: kvm-clock: cpu 2, msr 26196081, secondary cpu clock May 10 00:44:51.926780 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:44:51.926787 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 10 00:44:51.926794 kernel: #3 May 10 00:44:51.926801 kernel: kvm-clock: cpu 3, msr 261960c1, secondary cpu clock May 10 00:44:51.926807 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:44:51.926814 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 10 00:44:51.926821 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:44:51.926829 kernel: smpboot: Max logical packages: 1 May 10 00:44:51.926836 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:44:51.926843 kernel: devtmpfs: initialized May 10 00:44:51.926849 kernel: x86/mm: Memory block size: 128MB May 10 00:44:51.926856 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:44:51.926863 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:44:51.926870 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:44:51.926877 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:44:51.926884 kernel: audit: initializing netlink subsys (disabled) May 10 00:44:51.926892 kernel: audit: type=2000 audit(1746837890.787:1): state=initialized audit_enabled=0 res=1 May 10 00:44:51.926899 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:44:51.926905 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:44:51.926912 kernel: cpuidle: using governor menu May 10 00:44:51.926919 kernel: ACPI: bus type PCI registered May 10 00:44:51.926926 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:44:51.926932 kernel: dca service started, version 1.12.1 May 10 00:44:51.926939 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:44:51.926946 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:44:51.926954 kernel: PCI: Using configuration type 1 for base access May 10 00:44:51.926961 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:44:51.926968 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:44:51.926975 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:44:51.926981 kernel: ACPI: Added _OSI(Module Device) May 10 00:44:51.926988 kernel: ACPI: Added _OSI(Processor Device) May 10 00:44:51.926995 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:44:51.927002 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:44:51.927008 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:44:51.927016 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:44:51.927023 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:44:51.927030 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:44:51.927037 kernel: ACPI: Interpreter enabled May 10 00:44:51.927043 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:44:51.927050 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:44:51.927057 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:44:51.927065 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:44:51.927074 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:44:51.927215 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:44:51.927303 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:44:51.927372 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:44:51.927381 kernel: PCI host bridge to bus 0000:00 May 10 00:44:51.927463 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:44:51.927527 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:44:51.927590 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:44:51.927648 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:44:51.927745 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:44:51.927809 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 10 00:44:51.927872 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:44:51.927969 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:44:51.928053 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:44:51.928128 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 10 00:44:51.928196 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 10 00:44:51.928264 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 10 00:44:51.928331 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:44:51.928399 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 25390 usecs May 10 00:44:51.928487 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:44:51.928564 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 10 00:44:51.928636 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 10 00:44:51.928743 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 10 00:44:51.928863 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:44:51.928939 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 10 00:44:51.929007 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 10 00:44:51.929074 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 10 00:44:51.929159 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:44:51.929230 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 10 00:44:51.929298 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 10 00:44:51.929365 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 10 00:44:51.929433 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 10 00:44:51.929515 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:44:51.929583 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:44:51.929677 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:44:51.929797 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 10 00:44:51.929865 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 10 00:44:51.929945 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:44:51.930014 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 10 00:44:51.930023 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:44:51.930030 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:44:51.930037 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:44:51.930048 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:44:51.930055 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:44:51.930062 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:44:51.930069 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:44:51.930076 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:44:51.930083 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:44:51.930089 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:44:51.930096 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:44:51.930103 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:44:51.930111 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:44:51.930118 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:44:51.930125 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:44:51.930132 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:44:51.930139 kernel: iommu: Default domain type: Translated May 10 00:44:51.930145 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:44:51.930213 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:44:51.930279 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:44:51.930350 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:44:51.930359 kernel: vgaarb: loaded May 10 00:44:51.930366 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:44:51.930373 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:44:51.930380 kernel: PTP clock support registered May 10 00:44:51.930387 kernel: PCI: Using ACPI for IRQ routing May 10 00:44:51.930394 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:44:51.930400 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 00:44:51.930407 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 10 00:44:51.930416 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:44:51.930423 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:44:51.930429 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:44:51.930436 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:44:51.930443 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:44:51.930450 kernel: pnp: PnP ACPI init May 10 00:44:51.930542 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:44:51.930553 kernel: pnp: PnP ACPI: found 6 devices May 10 00:44:51.930562 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:44:51.930569 kernel: NET: Registered PF_INET protocol family May 10 00:44:51.930576 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:44:51.930583 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:44:51.930590 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:44:51.930597 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:44:51.930604 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:44:51.930610 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:44:51.930617 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:44:51.930626 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:44:51.930632 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:44:51.930639 kernel: NET: Registered PF_XDP protocol family May 10 00:44:51.930742 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:44:51.930809 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:44:51.930868 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:44:51.930928 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:44:51.930989 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:44:51.931049 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 10 00:44:51.931060 kernel: PCI: CLS 0 bytes, default 64 May 10 00:44:51.931067 kernel: Initialise system trusted keyrings May 10 00:44:51.931074 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:44:51.931081 kernel: Key type asymmetric registered May 10 00:44:51.931088 kernel: Asymmetric key parser 'x509' registered May 10 00:44:51.931095 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:44:51.931101 kernel: io scheduler mq-deadline registered May 10 00:44:51.931108 kernel: io scheduler kyber registered May 10 00:44:51.931115 kernel: io scheduler bfq registered May 10 00:44:51.931128 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:44:51.931136 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:44:51.931143 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:44:51.931150 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:44:51.931157 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:44:51.931164 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:44:51.931171 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:44:51.931178 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:44:51.931185 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:44:51.931195 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:44:51.931272 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:44:51.931336 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:44:51.931398 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:44:51 UTC (1746837891) May 10 00:44:51.931461 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:44:51.931469 kernel: NET: Registered PF_INET6 protocol family May 10 00:44:51.931476 kernel: Segment Routing with IPv6 May 10 00:44:51.931483 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:44:51.931496 kernel: NET: Registered PF_PACKET protocol family May 10 00:44:51.931502 kernel: Key type dns_resolver registered May 10 00:44:51.931509 kernel: IPI shorthand broadcast: enabled May 10 00:44:51.931516 kernel: sched_clock: Marking stable (661227638, 138991451)->(931648676, -131429587) May 10 00:44:51.931523 kernel: registered taskstats version 1 May 10 00:44:51.931530 kernel: Loading compiled-in X.509 certificates May 10 00:44:51.931537 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:44:51.931544 kernel: Key type .fscrypt registered May 10 00:44:51.931550 kernel: Key type fscrypt-provisioning registered May 10 00:44:51.931561 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:44:51.931568 kernel: ima: Allocated hash algorithm: sha1 May 10 00:44:51.931575 kernel: ima: No architecture policies found May 10 00:44:51.931582 kernel: clk: Disabling unused clocks May 10 00:44:51.931588 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:44:51.931595 kernel: Write protecting the kernel read-only data: 28672k May 10 00:44:51.931602 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:44:51.931609 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:44:51.931619 kernel: Run /init as init process May 10 00:44:51.931626 kernel: with arguments: May 10 00:44:51.931633 kernel: /init May 10 00:44:51.931640 kernel: with environment: May 10 00:44:51.931647 kernel: HOME=/ May 10 00:44:51.931653 kernel: TERM=linux May 10 00:44:51.931669 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:44:51.931681 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:51.931709 systemd[1]: Detected virtualization kvm. May 10 00:44:51.931720 systemd[1]: Detected architecture x86-64. May 10 00:44:51.931729 systemd[1]: Running in initrd. May 10 00:44:51.931737 systemd[1]: No hostname configured, using default hostname. May 10 00:44:51.931745 systemd[1]: Hostname set to . May 10 00:44:51.931753 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:51.931760 systemd[1]: Queued start job for default target initrd.target. May 10 00:44:51.931768 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:51.931775 systemd[1]: Reached target cryptsetup.target. May 10 00:44:51.931787 systemd[1]: Reached target paths.target. May 10 00:44:51.931811 systemd[1]: Reached target slices.target. May 10 00:44:51.931822 systemd[1]: Reached target swap.target. May 10 00:44:51.931829 systemd[1]: Reached target timers.target. May 10 00:44:51.931837 systemd[1]: Listening on iscsid.socket. May 10 00:44:51.931848 systemd[1]: Listening on iscsiuio.socket. May 10 00:44:51.931856 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:44:51.931863 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:44:51.931871 systemd[1]: Listening on systemd-journald.socket. May 10 00:44:51.931878 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:51.931886 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:51.931894 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:51.931905 systemd[1]: Reached target sockets.target. May 10 00:44:51.931913 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:51.931924 systemd[1]: Finished network-cleanup.service. May 10 00:44:51.931932 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:44:51.931939 systemd[1]: Starting systemd-journald.service... May 10 00:44:51.931947 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:51.931954 systemd[1]: Starting systemd-resolved.service... May 10 00:44:51.931962 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:44:51.931969 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:51.931977 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:44:51.931985 kernel: audit: type=1130 audit(1746837891.924:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.931998 systemd-journald[197]: Journal started May 10 00:44:51.932037 systemd-journald[197]: Runtime Journal (/run/log/journal/f5357a19bf4b47b9ac486728d6e5580a) is 6.0M, max 48.5M, 42.5M free. May 10 00:44:51.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.934121 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:51.935372 systemd-modules-load[198]: Inserted module 'overlay' May 10 00:44:51.973467 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:44:51.973491 systemd[1]: Started systemd-journald.service. May 10 00:44:51.943391 systemd-resolved[199]: Positive Trust Anchors: May 10 00:44:51.978054 kernel: audit: type=1130 audit(1746837891.973:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.943401 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:51.983302 kernel: audit: type=1130 audit(1746837891.977:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.943428 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:51.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.945596 systemd-resolved[199]: Defaulting to hostname 'linux'. May 10 00:44:51.998670 kernel: audit: type=1130 audit(1746837891.982:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.998724 kernel: audit: type=1130 audit(1746837891.986:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:51.974459 systemd[1]: Started systemd-resolved.service. May 10 00:44:51.978565 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:44:52.001442 kernel: Bridge firewalling registered May 10 00:44:51.983848 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:51.987744 systemd[1]: Reached target nss-lookup.target. May 10 00:44:52.000210 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:44:52.004737 systemd-modules-load[198]: Inserted module 'br_netfilter' May 10 00:44:52.017206 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:44:52.022246 kernel: audit: type=1130 audit(1746837892.016:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.018687 systemd[1]: Starting dracut-cmdline.service... May 10 00:44:52.028144 dracut-cmdline[215]: dracut-dracut-053 May 10 00:44:52.030464 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:52.035638 kernel: SCSI subsystem initialized May 10 00:44:52.047856 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:44:52.047917 kernel: device-mapper: uevent: version 1.0.3 May 10 00:44:52.047945 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:44:52.052146 systemd-modules-load[198]: Inserted module 'dm_multipath' May 10 00:44:52.053882 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:52.058934 kernel: audit: type=1130 audit(1746837892.053:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.059341 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:52.065850 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:52.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.070726 kernel: audit: type=1130 audit(1746837892.066:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.090738 kernel: Loading iSCSI transport class v2.0-870. May 10 00:44:52.108733 kernel: iscsi: registered transport (tcp) May 10 00:44:52.130749 kernel: iscsi: registered transport (qla4xxx) May 10 00:44:52.130829 kernel: QLogic iSCSI HBA Driver May 10 00:44:52.160393 systemd[1]: Finished dracut-cmdline.service. May 10 00:44:52.165088 kernel: audit: type=1130 audit(1746837892.159:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.165127 systemd[1]: Starting dracut-pre-udev.service... May 10 00:44:52.212742 kernel: raid6: avx2x4 gen() 29805 MB/s May 10 00:44:52.229735 kernel: raid6: avx2x4 xor() 7961 MB/s May 10 00:44:52.246723 kernel: raid6: avx2x2 gen() 32062 MB/s May 10 00:44:52.263751 kernel: raid6: avx2x2 xor() 16955 MB/s May 10 00:44:52.280737 kernel: raid6: avx2x1 gen() 25724 MB/s May 10 00:44:52.297726 kernel: raid6: avx2x1 xor() 14877 MB/s May 10 00:44:52.314733 kernel: raid6: sse2x4 gen() 14479 MB/s May 10 00:44:52.331742 kernel: raid6: sse2x4 xor() 6772 MB/s May 10 00:44:52.348754 kernel: raid6: sse2x2 gen() 14803 MB/s May 10 00:44:52.365739 kernel: raid6: sse2x2 xor() 9162 MB/s May 10 00:44:52.382733 kernel: raid6: sse2x1 gen() 10713 MB/s May 10 00:44:52.400229 kernel: raid6: sse2x1 xor() 7456 MB/s May 10 00:44:52.400273 kernel: raid6: using algorithm avx2x2 gen() 32062 MB/s May 10 00:44:52.400283 kernel: raid6: .... xor() 16955 MB/s, rmw enabled May 10 00:44:52.400981 kernel: raid6: using avx2x2 recovery algorithm May 10 00:44:52.413728 kernel: xor: automatically using best checksumming function avx May 10 00:44:52.514749 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:44:52.524182 systemd[1]: Finished dracut-pre-udev.service. May 10 00:44:52.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.525000 audit: BPF prog-id=7 op=LOAD May 10 00:44:52.525000 audit: BPF prog-id=8 op=LOAD May 10 00:44:52.526387 systemd[1]: Starting systemd-udevd.service... May 10 00:44:52.540213 systemd-udevd[398]: Using default interface naming scheme 'v252'. May 10 00:44:52.545530 systemd[1]: Started systemd-udevd.service. May 10 00:44:52.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.548243 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:44:52.559891 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation May 10 00:44:52.587396 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:44:52.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.589123 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:52.623805 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:52.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:52.662507 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:44:52.675974 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:44:52.675988 kernel: GPT:9289727 != 19775487 May 10 00:44:52.675997 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:44:52.676006 kernel: GPT:9289727 != 19775487 May 10 00:44:52.676023 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:44:52.676032 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:52.676041 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:44:52.678720 kernel: libata version 3.00 loaded. May 10 00:44:52.691402 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:44:52.691455 kernel: AES CTR mode by8 optimization enabled May 10 00:44:52.695720 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:44:52.711108 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:44:52.711126 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:44:52.711237 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:44:52.711318 kernel: scsi host0: ahci May 10 00:44:52.711439 kernel: scsi host1: ahci May 10 00:44:52.711551 kernel: scsi host2: ahci May 10 00:44:52.711657 kernel: scsi host3: ahci May 10 00:44:52.711768 kernel: scsi host4: ahci May 10 00:44:52.711869 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (454) May 10 00:44:52.711883 kernel: scsi host5: ahci May 10 00:44:52.711997 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 10 00:44:52.712008 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 10 00:44:52.712017 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 10 00:44:52.712025 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 10 00:44:52.712034 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 10 00:44:52.712044 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 10 00:44:52.710735 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:44:52.760140 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:44:52.762782 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:44:52.763029 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:44:52.767972 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:52.771277 systemd[1]: Starting disk-uuid.service... May 10 00:44:52.785653 disk-uuid[520]: Primary Header is updated. May 10 00:44:52.785653 disk-uuid[520]: Secondary Entries is updated. May 10 00:44:52.785653 disk-uuid[520]: Secondary Header is updated. May 10 00:44:52.790728 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:52.794723 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:53.021993 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:44:53.022069 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:44:53.022082 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:44:53.024032 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:44:53.024725 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:44:53.025881 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:44:53.026753 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:44:53.027900 kernel: ata3.00: applying bridge limits May 10 00:44:53.028750 kernel: ata3.00: configured for UDMA/100 May 10 00:44:53.030764 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:44:53.062091 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:44:53.079689 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:44:53.079727 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:44:53.819633 disk-uuid[521]: The operation has completed successfully. May 10 00:44:53.821504 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:53.844359 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:44:53.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:53.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:53.844442 systemd[1]: Finished disk-uuid.service. May 10 00:44:53.851292 systemd[1]: Starting verity-setup.service... May 10 00:44:53.864745 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:44:53.886794 systemd[1]: Found device dev-mapper-usr.device. May 10 00:44:53.887743 systemd[1]: Mounting sysusr-usr.mount... May 10 00:44:53.890842 systemd[1]: Finished verity-setup.service. May 10 00:44:53.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:53.977744 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:44:53.978596 systemd[1]: Mounted sysusr-usr.mount. May 10 00:44:53.979851 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:44:53.980835 systemd[1]: Starting ignition-setup.service... May 10 00:44:53.984051 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:44:53.991907 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:53.991984 kernel: BTRFS info (device vda6): using free space tree May 10 00:44:53.991998 kernel: BTRFS info (device vda6): has skinny extents May 10 00:44:54.031562 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:44:54.065272 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:44:54.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.066000 audit: BPF prog-id=9 op=LOAD May 10 00:44:54.068112 systemd[1]: Starting systemd-networkd.service... May 10 00:44:54.090296 systemd-networkd[707]: lo: Link UP May 10 00:44:54.090308 systemd-networkd[707]: lo: Gained carrier May 10 00:44:54.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.090800 systemd-networkd[707]: Enumeration completed May 10 00:44:54.090953 systemd[1]: Started systemd-networkd.service. May 10 00:44:54.091023 systemd-networkd[707]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:54.114420 systemd-networkd[707]: eth0: Link UP May 10 00:44:54.114426 systemd-networkd[707]: eth0: Gained carrier May 10 00:44:54.115635 systemd[1]: Reached target network.target. May 10 00:44:54.118452 systemd[1]: Starting iscsiuio.service... May 10 00:44:54.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.123210 systemd[1]: Started iscsiuio.service. May 10 00:44:54.125806 systemd[1]: Starting iscsid.service... May 10 00:44:54.126817 systemd-networkd[707]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:44:54.152448 iscsid[712]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:54.152448 iscsid[712]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:44:54.152448 iscsid[712]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:44:54.152448 iscsid[712]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:44:54.152448 iscsid[712]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:44:54.152448 iscsid[712]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:54.152448 iscsid[712]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:44:54.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.130588 systemd[1]: Started iscsid.service. May 10 00:44:54.153768 systemd[1]: Starting dracut-initqueue.service... May 10 00:44:54.164522 systemd[1]: Finished dracut-initqueue.service. May 10 00:44:54.165857 systemd[1]: Reached target remote-fs-pre.target. May 10 00:44:54.195890 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:54.196908 systemd[1]: Reached target remote-fs.target. May 10 00:44:54.198393 systemd[1]: Starting dracut-pre-mount.service... May 10 00:44:54.206008 systemd[1]: Finished dracut-pre-mount.service. May 10 00:44:54.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.221542 systemd[1]: Finished ignition-setup.service. May 10 00:44:54.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.223493 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:44:54.262638 ignition[727]: Ignition 2.14.0 May 10 00:44:54.262649 ignition[727]: Stage: fetch-offline May 10 00:44:54.262723 ignition[727]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:54.262734 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:54.262826 ignition[727]: parsed url from cmdline: "" May 10 00:44:54.262828 ignition[727]: no config URL provided May 10 00:44:54.262833 ignition[727]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:44:54.262839 ignition[727]: no config at "/usr/lib/ignition/user.ign" May 10 00:44:54.262861 ignition[727]: op(1): [started] loading QEMU firmware config module May 10 00:44:54.262865 ignition[727]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:44:54.272948 ignition[727]: op(1): [finished] loading QEMU firmware config module May 10 00:44:54.314838 ignition[727]: parsing config with SHA512: dfdb5aa325ec9491e25fe60438beb8700bff8dd43618aeafd01b8e07ae4d08296679322b4312f0acd86bdf8feca038e866f5969e1bf2d0435355786565ce5ae0 May 10 00:44:54.321127 unknown[727]: fetched base config from "system" May 10 00:44:54.322324 unknown[727]: fetched user config from "qemu" May 10 00:44:54.323891 ignition[727]: fetch-offline: fetch-offline passed May 10 00:44:54.324024 ignition[727]: Ignition finished successfully May 10 00:44:54.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.325062 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:44:54.326586 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:44:54.327268 systemd[1]: Starting ignition-kargs.service... May 10 00:44:54.338408 ignition[735]: Ignition 2.14.0 May 10 00:44:54.338420 ignition[735]: Stage: kargs May 10 00:44:54.338523 ignition[735]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:54.338534 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:54.343404 systemd[1]: Finished ignition-kargs.service. May 10 00:44:54.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.339557 ignition[735]: kargs: kargs passed May 10 00:44:54.345993 systemd[1]: Starting ignition-disks.service... May 10 00:44:54.339595 ignition[735]: Ignition finished successfully May 10 00:44:54.354136 ignition[741]: Ignition 2.14.0 May 10 00:44:54.354149 ignition[741]: Stage: disks May 10 00:44:54.354257 ignition[741]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:54.354269 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:54.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.356451 systemd[1]: Finished ignition-disks.service. May 10 00:44:54.355495 ignition[741]: disks: disks passed May 10 00:44:54.357746 systemd[1]: Reached target initrd-root-device.target. May 10 00:44:54.355540 ignition[741]: Ignition finished successfully May 10 00:44:54.359839 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:54.360871 systemd[1]: Reached target local-fs.target. May 10 00:44:54.361836 systemd[1]: Reached target sysinit.target. May 10 00:44:54.362786 systemd[1]: Reached target basic.target. May 10 00:44:54.365223 systemd[1]: Starting systemd-fsck-root.service... May 10 00:44:54.377075 systemd-fsck[749]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:44:54.488477 systemd[1]: Finished systemd-fsck-root.service. May 10 00:44:54.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.491244 systemd[1]: Mounting sysroot.mount... May 10 00:44:54.504726 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:44:54.505351 systemd[1]: Mounted sysroot.mount. May 10 00:44:54.506454 systemd[1]: Reached target initrd-root-fs.target. May 10 00:44:54.509473 systemd[1]: Mounting sysroot-usr.mount... May 10 00:44:54.510627 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:44:54.510666 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:44:54.510690 systemd[1]: Reached target ignition-diskful.target. May 10 00:44:54.513030 systemd[1]: Mounted sysroot-usr.mount. May 10 00:44:54.515257 systemd[1]: Starting initrd-setup-root.service... May 10 00:44:54.520162 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:44:54.523816 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory May 10 00:44:54.528003 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:44:54.532173 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:44:54.563193 systemd[1]: Finished initrd-setup-root.service. May 10 00:44:54.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.564868 systemd[1]: Starting ignition-mount.service... May 10 00:44:54.566094 systemd[1]: Starting sysroot-boot.service... May 10 00:44:54.573667 bash[801]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:44:54.583345 ignition[802]: INFO : Ignition 2.14.0 May 10 00:44:54.583345 ignition[802]: INFO : Stage: mount May 10 00:44:54.592713 ignition[802]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:54.592713 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:54.596244 ignition[802]: INFO : mount: mount passed May 10 00:44:54.596244 ignition[802]: INFO : Ignition finished successfully May 10 00:44:54.597762 systemd[1]: Finished ignition-mount.service. May 10 00:44:54.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.598383 systemd[1]: Finished sysroot-boot.service. May 10 00:44:54.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:54.896970 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:44:54.907203 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (811) May 10 00:44:54.907265 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:54.907275 kernel: BTRFS info (device vda6): using free space tree May 10 00:44:54.908797 kernel: BTRFS info (device vda6): has skinny extents May 10 00:44:54.912243 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:44:54.914310 systemd[1]: Starting ignition-files.service... May 10 00:44:54.936323 ignition[831]: INFO : Ignition 2.14.0 May 10 00:44:54.936323 ignition[831]: INFO : Stage: files May 10 00:44:54.936323 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:54.936323 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:54.941618 ignition[831]: DEBUG : files: compiled without relabeling support, skipping May 10 00:44:54.941618 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:44:54.941618 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:44:54.941618 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:44:54.941618 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:44:54.949297 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:44:54.949297 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:54.949297 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:44:54.941885 unknown[831]: wrote ssh authorized keys file for user: core May 10 00:44:54.993986 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:44:55.125360 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:55.125360 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:44:55.152354 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:44:55.152354 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:55.155792 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:55.157482 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:55.159219 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:55.160934 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:55.162641 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:55.164654 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:55.166632 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:55.168638 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:55.168638 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:55.168638 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:55.168638 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:44:55.333925 systemd-networkd[707]: eth0: Gained IPv6LL May 10 00:44:55.565601 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:44:56.002424 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:56.002424 ignition[831]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:44:56.007105 ignition[831]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:44:56.045186 ignition[831]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:44:56.047211 ignition[831]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:44:56.047211 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:56.047211 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:56.047211 ignition[831]: INFO : files: files passed May 10 00:44:56.047211 ignition[831]: INFO : Ignition finished successfully May 10 00:44:56.056692 systemd[1]: Finished ignition-files.service. May 10 00:44:56.064163 kernel: kauditd_printk_skb: 24 callbacks suppressed May 10 00:44:56.064194 kernel: audit: type=1130 audit(1746837896.056:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.057979 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:44:56.064652 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:44:56.065833 systemd[1]: Starting ignition-quench.service... May 10 00:44:56.078322 kernel: audit: type=1130 audit(1746837896.069:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.078356 kernel: audit: type=1131 audit(1746837896.069:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.068806 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:44:56.068901 systemd[1]: Finished ignition-quench.service. May 10 00:44:56.080870 initrd-setup-root-after-ignition[856]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:44:56.082575 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:44:56.083214 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:44:56.091151 kernel: audit: type=1130 audit(1746837896.085:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.085489 systemd[1]: Reached target ignition-complete.target. May 10 00:44:56.092320 systemd[1]: Starting initrd-parse-etc.service... May 10 00:44:56.107287 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:44:56.107428 systemd[1]: Finished initrd-parse-etc.service. May 10 00:44:56.119148 kernel: audit: type=1130 audit(1746837896.109:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.119179 kernel: audit: type=1131 audit(1746837896.109:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.109806 systemd[1]: Reached target initrd-fs.target. May 10 00:44:56.118172 systemd[1]: Reached target initrd.target. May 10 00:44:56.118320 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:44:56.119192 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:44:56.130768 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:44:56.138477 kernel: audit: type=1130 audit(1746837896.133:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.134283 systemd[1]: Starting initrd-cleanup.service... May 10 00:44:56.143825 systemd[1]: Stopped target nss-lookup.target. May 10 00:44:56.145058 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:44:56.147127 systemd[1]: Stopped target timers.target. May 10 00:44:56.149060 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:44:56.156042 kernel: audit: type=1131 audit(1746837896.150:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.149226 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:44:56.151131 systemd[1]: Stopped target initrd.target. May 10 00:44:56.156166 systemd[1]: Stopped target basic.target. May 10 00:44:56.158039 systemd[1]: Stopped target ignition-complete.target. May 10 00:44:56.159782 systemd[1]: Stopped target ignition-diskful.target. May 10 00:44:56.161569 systemd[1]: Stopped target initrd-root-device.target. May 10 00:44:56.163424 systemd[1]: Stopped target remote-fs.target. May 10 00:44:56.165348 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:44:56.168893 systemd[1]: Stopped target sysinit.target. May 10 00:44:56.172130 systemd[1]: Stopped target local-fs.target. May 10 00:44:56.173806 systemd[1]: Stopped target local-fs-pre.target. May 10 00:44:56.175421 systemd[1]: Stopped target swap.target. May 10 00:44:56.183519 kernel: audit: type=1131 audit(1746837896.177:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.177001 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:44:56.177144 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:44:56.191073 kernel: audit: type=1131 audit(1746837896.185:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.178830 systemd[1]: Stopped target cryptsetup.target. May 10 00:44:56.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.183625 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:44:56.183819 systemd[1]: Stopped dracut-initqueue.service. May 10 00:44:56.185926 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:44:56.186023 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:44:56.191270 systemd[1]: Stopped target paths.target. May 10 00:44:56.193246 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:44:56.196990 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:44:56.198329 systemd[1]: Stopped target slices.target. May 10 00:44:56.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.200476 systemd[1]: Stopped target sockets.target. May 10 00:44:56.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.202192 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:44:56.202292 systemd[1]: Closed iscsid.socket. May 10 00:44:56.204324 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:44:56.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.204450 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:44:56.206469 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:44:56.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.206611 systemd[1]: Stopped ignition-files.service. May 10 00:44:56.209137 systemd[1]: Stopping ignition-mount.service... May 10 00:44:56.221457 ignition[871]: INFO : Ignition 2.14.0 May 10 00:44:56.221457 ignition[871]: INFO : Stage: umount May 10 00:44:56.221457 ignition[871]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:56.221457 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:56.221457 ignition[871]: INFO : umount: umount passed May 10 00:44:56.221457 ignition[871]: INFO : Ignition finished successfully May 10 00:44:56.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.210212 systemd[1]: Stopping iscsiuio.service... May 10 00:44:56.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.211882 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:44:56.212086 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:44:56.214723 systemd[1]: Stopping sysroot-boot.service... May 10 00:44:56.215882 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:44:56.216030 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:44:56.218221 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:44:56.218333 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:44:56.224261 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:44:56.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.224374 systemd[1]: Stopped iscsiuio.service. May 10 00:44:56.225886 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:44:56.225956 systemd[1]: Stopped ignition-mount.service. May 10 00:44:56.228610 systemd[1]: Stopped target network.target. May 10 00:44:56.258000 audit: BPF prog-id=6 op=UNLOAD May 10 00:44:56.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.231825 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:44:56.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.231876 systemd[1]: Closed iscsiuio.socket. May 10 00:44:56.233829 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:44:56.233887 systemd[1]: Stopped ignition-disks.service. May 10 00:44:56.236296 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:44:56.236343 systemd[1]: Stopped ignition-kargs.service. May 10 00:44:56.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.236724 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:44:56.236805 systemd[1]: Stopped ignition-setup.service. May 10 00:44:56.237210 systemd[1]: Stopping systemd-networkd.service... May 10 00:44:56.237404 systemd[1]: Stopping systemd-resolved.service... May 10 00:44:56.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.238620 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:44:56.239177 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:44:56.239262 systemd[1]: Finished initrd-cleanup.service. May 10 00:44:56.246776 systemd-networkd[707]: eth0: DHCPv6 lease lost May 10 00:44:56.281000 audit: BPF prog-id=9 op=UNLOAD May 10 00:44:56.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.249191 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:44:56.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.249321 systemd[1]: Stopped systemd-networkd.service. May 10 00:44:56.251667 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:44:56.251798 systemd[1]: Stopped systemd-resolved.service. May 10 00:44:56.254954 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:44:56.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.255006 systemd[1]: Closed systemd-networkd.socket. May 10 00:44:56.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.257921 systemd[1]: Stopping network-cleanup.service... May 10 00:44:56.258856 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:44:56.258901 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:44:56.260924 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:44:56.260960 systemd[1]: Stopped systemd-sysctl.service. May 10 00:44:56.263107 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:44:56.263141 systemd[1]: Stopped systemd-modules-load.service. May 10 00:44:56.264256 systemd[1]: Stopping systemd-udevd.service... May 10 00:44:56.266297 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:44:56.269955 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:44:56.270040 systemd[1]: Stopped network-cleanup.service. May 10 00:44:56.273963 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:44:56.274076 systemd[1]: Stopped systemd-udevd.service. May 10 00:44:56.276940 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:44:56.276992 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:44:56.279082 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:44:56.279114 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:44:56.281009 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:44:56.281055 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:44:56.282674 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:44:56.282728 systemd[1]: Stopped dracut-cmdline.service. May 10 00:44:56.284267 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:44:56.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.284308 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:44:56.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:56.285813 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:44:56.287189 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:44:56.287236 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:44:56.291650 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:44:56.291788 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:44:56.314419 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:44:56.314539 systemd[1]: Stopped sysroot-boot.service. May 10 00:44:56.316295 systemd[1]: Reached target initrd-switch-root.target. May 10 00:44:56.318300 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:44:56.318342 systemd[1]: Stopped initrd-setup-root.service. May 10 00:44:56.319898 systemd[1]: Starting initrd-switch-root.service... May 10 00:44:56.335820 systemd[1]: Switching root. May 10 00:44:56.355564 iscsid[712]: iscsid shutting down. May 10 00:44:56.356427 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). May 10 00:44:56.356475 systemd-journald[197]: Journal stopped May 10 00:44:59.682328 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:44:59.682379 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:44:59.682393 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:44:59.682406 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:44:59.682418 kernel: SELinux: policy capability open_perms=1 May 10 00:44:59.682442 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:44:59.682455 kernel: SELinux: policy capability always_check_network=0 May 10 00:44:59.682468 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:44:59.682489 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:44:59.682502 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:44:59.682515 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:44:59.682530 systemd[1]: Successfully loaded SELinux policy in 42.741ms. May 10 00:44:59.682552 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.666ms. May 10 00:44:59.682568 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:59.682588 systemd[1]: Detected virtualization kvm. May 10 00:44:59.682602 systemd[1]: Detected architecture x86-64. May 10 00:44:59.682615 systemd[1]: Detected first boot. May 10 00:44:59.682629 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:59.682646 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:44:59.682660 systemd[1]: Populated /etc with preset unit settings. May 10 00:44:59.682674 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:59.682694 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:59.682722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:59.682739 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:44:59.682753 systemd[1]: Stopped iscsid.service. May 10 00:44:59.682766 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:44:59.682789 systemd[1]: Stopped initrd-switch-root.service. May 10 00:44:59.682803 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:44:59.682820 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:44:59.682834 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:44:59.682847 systemd[1]: Created slice system-getty.slice. May 10 00:44:59.682862 systemd[1]: Created slice system-modprobe.slice. May 10 00:44:59.682876 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:44:59.682889 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:44:59.682902 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:44:59.682921 systemd[1]: Created slice user.slice. May 10 00:44:59.682935 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:59.682948 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:44:59.682962 systemd[1]: Set up automount boot.automount. May 10 00:44:59.682975 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:44:59.682988 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:44:59.683002 systemd[1]: Stopped target initrd-fs.target. May 10 00:44:59.683016 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:44:59.683037 systemd[1]: Reached target integritysetup.target. May 10 00:44:59.683052 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:59.683065 systemd[1]: Reached target remote-fs.target. May 10 00:44:59.683079 systemd[1]: Reached target slices.target. May 10 00:44:59.683092 systemd[1]: Reached target swap.target. May 10 00:44:59.683105 systemd[1]: Reached target torcx.target. May 10 00:44:59.683118 systemd[1]: Reached target veritysetup.target. May 10 00:44:59.683131 systemd[1]: Listening on systemd-coredump.socket. May 10 00:44:59.683144 systemd[1]: Listening on systemd-initctl.socket. May 10 00:44:59.683166 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:59.683180 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:59.683193 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:59.683206 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:44:59.683219 systemd[1]: Mounting dev-hugepages.mount... May 10 00:44:59.683233 systemd[1]: Mounting dev-mqueue.mount... May 10 00:44:59.683246 systemd[1]: Mounting media.mount... May 10 00:44:59.683259 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:59.683273 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:44:59.683286 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:44:59.683306 systemd[1]: Mounting tmp.mount... May 10 00:44:59.683319 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:44:59.683333 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:59.683346 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:59.683359 systemd[1]: Starting modprobe@configfs.service... May 10 00:44:59.683372 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:59.683386 systemd[1]: Starting modprobe@drm.service... May 10 00:44:59.683399 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:59.683412 systemd[1]: Starting modprobe@fuse.service... May 10 00:44:59.683431 systemd[1]: Starting modprobe@loop.service... May 10 00:44:59.683445 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:44:59.683460 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:44:59.683483 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:44:59.683500 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:44:59.683513 kernel: loop: module loaded May 10 00:44:59.683527 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:44:59.683540 kernel: fuse: init (API version 7.34) May 10 00:44:59.683558 systemd[1]: Stopped systemd-journald.service. May 10 00:44:59.683572 systemd[1]: Starting systemd-journald.service... May 10 00:44:59.683585 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:59.683598 systemd[1]: Starting systemd-network-generator.service... May 10 00:44:59.683611 systemd[1]: Starting systemd-remount-fs.service... May 10 00:44:59.683625 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:59.683638 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:44:59.683651 systemd[1]: Stopped verity-setup.service. May 10 00:44:59.683670 systemd-journald[988]: Journal started May 10 00:44:59.683742 systemd-journald[988]: Runtime Journal (/run/log/journal/f5357a19bf4b47b9ac486728d6e5580a) is 6.0M, max 48.5M, 42.5M free. May 10 00:44:56.416000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:44:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:57.097000 audit: BPF prog-id=10 op=LOAD May 10 00:44:57.097000 audit: BPF prog-id=10 op=UNLOAD May 10 00:44:57.097000 audit: BPF prog-id=11 op=LOAD May 10 00:44:57.097000 audit: BPF prog-id=11 op=UNLOAD May 10 00:44:57.130000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:44:57.130000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:57.132000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:44:57.132000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9a9 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.132000 audit: CWD cwd="/" May 10 00:44:57.132000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:57.132000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:57.132000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:59.447000 audit: BPF prog-id=12 op=LOAD May 10 00:44:59.447000 audit: BPF prog-id=3 op=UNLOAD May 10 00:44:59.447000 audit: BPF prog-id=13 op=LOAD May 10 00:44:59.447000 audit: BPF prog-id=14 op=LOAD May 10 00:44:59.447000 audit: BPF prog-id=4 op=UNLOAD May 10 00:44:59.447000 audit: BPF prog-id=5 op=UNLOAD May 10 00:44:59.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.460000 audit: BPF prog-id=12 op=UNLOAD May 10 00:44:59.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.629000 audit: BPF prog-id=15 op=LOAD May 10 00:44:59.629000 audit: BPF prog-id=16 op=LOAD May 10 00:44:59.629000 audit: BPF prog-id=17 op=LOAD May 10 00:44:59.629000 audit: BPF prog-id=13 op=UNLOAD May 10 00:44:59.629000 audit: BPF prog-id=14 op=UNLOAD May 10 00:44:59.680000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:44:59.680000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdc2686030 a2=4000 a3=7ffdc26860cc items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.680000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:44:59.445557 systemd[1]: Queued start job for default target multi-user.target. May 10 00:44:57.129517 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:59.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.445571 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:44:57.129743 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:59.449063 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:44:57.129759 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:57.129785 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:44:57.129794 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:44:57.129821 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:44:57.129832 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:44:57.130013 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:44:57.130042 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:57.130053 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:57.130755 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:44:57.130787 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:44:57.130803 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:44:57.130816 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:44:57.130832 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:44:57.130844 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:44:59.105205 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:59.105449 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:59.105546 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:59.105695 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:59.105759 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:44:59.105812 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-05-10T00:44:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:44:59.687735 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:59.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.690755 systemd[1]: Started systemd-journald.service. May 10 00:44:59.691100 systemd[1]: Mounted dev-hugepages.mount. May 10 00:44:59.692011 systemd[1]: Mounted dev-mqueue.mount. May 10 00:44:59.692901 systemd[1]: Mounted media.mount. May 10 00:44:59.693689 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:44:59.694589 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:44:59.695552 systemd[1]: Mounted tmp.mount. May 10 00:44:59.696468 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:44:59.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.697619 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:59.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.698723 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:44:59.698846 systemd[1]: Finished modprobe@configfs.service. May 10 00:44:59.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.699957 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:59.700078 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:59.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.701142 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:59.701251 systemd[1]: Finished modprobe@drm.service. May 10 00:44:59.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.702285 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:59.702396 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:59.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.703514 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:44:59.703653 systemd[1]: Finished modprobe@fuse.service. May 10 00:44:59.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.704668 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:59.704811 systemd[1]: Finished modprobe@loop.service. May 10 00:44:59.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.705888 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:59.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.707032 systemd[1]: Finished systemd-network-generator.service. May 10 00:44:59.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.708291 systemd[1]: Finished systemd-remount-fs.service. May 10 00:44:59.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.709536 systemd[1]: Reached target network-pre.target. May 10 00:44:59.711385 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:44:59.713551 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:44:59.714857 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:44:59.716272 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:44:59.749901 systemd[1]: Starting systemd-journal-flush.service... May 10 00:44:59.751134 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:59.751896 systemd[1]: Starting systemd-random-seed.service... May 10 00:44:59.753008 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:59.757871 systemd-journald[988]: Time spent on flushing to /var/log/journal/f5357a19bf4b47b9ac486728d6e5580a is 13.513ms for 1090 entries. May 10 00:44:59.757871 systemd-journald[988]: System Journal (/var/log/journal/f5357a19bf4b47b9ac486728d6e5580a) is 8.0M, max 195.6M, 187.6M free. May 10 00:45:00.210211 systemd-journald[988]: Received client request to flush runtime journal. May 10 00:44:59.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:59.753759 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:59.755334 systemd[1]: Starting systemd-sysusers.service... May 10 00:44:59.758721 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:45:00.211154 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:44:59.760261 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:44:59.761346 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:44:59.763182 systemd[1]: Starting systemd-udev-settle.service... May 10 00:44:59.834911 systemd[1]: Finished systemd-sysusers.service. May 10 00:44:59.836128 systemd[1]: Finished systemd-sysctl.service. May 10 00:45:00.042658 systemd[1]: Finished systemd-random-seed.service. May 10 00:45:00.043955 systemd[1]: Reached target first-boot-complete.target. May 10 00:45:00.211323 systemd[1]: Finished systemd-journal-flush.service. May 10 00:45:00.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.643228 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:45:00.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.657000 audit: BPF prog-id=18 op=LOAD May 10 00:45:00.657000 audit: BPF prog-id=19 op=LOAD May 10 00:45:00.657000 audit: BPF prog-id=7 op=UNLOAD May 10 00:45:00.657000 audit: BPF prog-id=8 op=UNLOAD May 10 00:45:00.659206 systemd[1]: Starting systemd-udevd.service... May 10 00:45:00.677144 systemd-udevd[1010]: Using default interface naming scheme 'v252'. May 10 00:45:00.690206 systemd[1]: Started systemd-udevd.service. May 10 00:45:00.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.693000 audit: BPF prog-id=20 op=LOAD May 10 00:45:00.694934 systemd[1]: Starting systemd-networkd.service... May 10 00:45:00.699000 audit: BPF prog-id=21 op=LOAD May 10 00:45:00.699000 audit: BPF prog-id=22 op=LOAD May 10 00:45:00.699000 audit: BPF prog-id=23 op=LOAD May 10 00:45:00.700612 systemd[1]: Starting systemd-userdbd.service... May 10 00:45:00.732628 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:45:00.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.736251 systemd[1]: Started systemd-userdbd.service. May 10 00:45:00.766524 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:45:00.777731 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:45:00.784726 kernel: ACPI: button: Power Button [PWRF] May 10 00:45:00.797800 systemd-networkd[1021]: lo: Link UP May 10 00:45:00.798135 systemd-networkd[1021]: lo: Gained carrier May 10 00:45:00.798735 systemd-networkd[1021]: Enumeration completed May 10 00:45:00.799169 systemd[1]: Started systemd-networkd.service. May 10 00:45:00.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.800753 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:00.797000 audit[1020]: AVC avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:45:00.797000 audit[1020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5573a9e9b090 a1=338ac a2=7f3e533edbc5 a3=5 items=110 ppid=1010 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:00.803756 systemd-networkd[1021]: eth0: Link UP May 10 00:45:00.803761 systemd-networkd[1021]: eth0: Gained carrier May 10 00:45:00.797000 audit: CWD cwd="/" May 10 00:45:00.797000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=1 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=2 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=3 name=(null) inode=16500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=4 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=5 name=(null) inode=16501 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=6 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=7 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=8 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=9 name=(null) inode=16503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=10 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=11 name=(null) inode=16504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=12 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=13 name=(null) inode=16505 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=14 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=15 name=(null) inode=16506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=16 name=(null) inode=16502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=17 name=(null) inode=16507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=18 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=19 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=20 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=21 name=(null) inode=16509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=22 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=23 name=(null) inode=16510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=24 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=25 name=(null) inode=16511 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=26 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=27 name=(null) inode=16512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=28 name=(null) inode=16508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=29 name=(null) inode=16513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=30 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=31 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=32 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=33 name=(null) inode=16515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=34 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=35 name=(null) inode=16516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=36 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=37 name=(null) inode=16517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=38 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=39 name=(null) inode=16518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=40 name=(null) inode=16514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=41 name=(null) inode=16519 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=42 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=43 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=44 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=45 name=(null) inode=16521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=46 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=47 name=(null) inode=16522 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=48 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=49 name=(null) inode=16523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=50 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=51 name=(null) inode=16524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=52 name=(null) inode=16520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=53 name=(null) inode=16525 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=55 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=56 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=57 name=(null) inode=16527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=58 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=59 name=(null) inode=16528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=60 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=61 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=62 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=63 name=(null) inode=16530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=64 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=65 name=(null) inode=16531 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=66 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=67 name=(null) inode=16532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=68 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=69 name=(null) inode=16533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=70 name=(null) inode=16529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=71 name=(null) inode=16534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=72 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=73 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=74 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=75 name=(null) inode=16536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=76 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=77 name=(null) inode=16537 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=78 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=79 name=(null) inode=16538 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=80 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=81 name=(null) inode=16539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=82 name=(null) inode=16535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=83 name=(null) inode=16540 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=84 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=85 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=86 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=87 name=(null) inode=16542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=88 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=89 name=(null) inode=16543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=90 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=91 name=(null) inode=16544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=92 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=93 name=(null) inode=16545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=94 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=95 name=(null) inode=16546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=96 name=(null) inode=16526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=97 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=98 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=99 name=(null) inode=16548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=100 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=101 name=(null) inode=16549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=102 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=103 name=(null) inode=16550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=104 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=105 name=(null) inode=16551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=106 name=(null) inode=16547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=107 name=(null) inode=16552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PATH item=109 name=(null) inode=16553 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:00.797000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:45:00.814948 systemd-networkd[1021]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:45:00.836774 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:45:00.839382 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:45:00.840042 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:45:00.844738 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:45:00.848733 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:45:00.891883 kernel: kvm: Nested Virtualization enabled May 10 00:45:00.891978 kernel: SVM: kvm: Nested Paging enabled May 10 00:45:00.891995 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:45:00.892011 kernel: SVM: Virtual GIF supported May 10 00:45:00.914738 kernel: EDAC MC: Ver: 3.0.0 May 10 00:45:00.937089 systemd[1]: Finished systemd-udev-settle.service. May 10 00:45:00.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.939469 systemd[1]: Starting lvm2-activation-early.service... May 10 00:45:00.947236 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:00.974763 systemd[1]: Finished lvm2-activation-early.service. May 10 00:45:00.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.975989 systemd[1]: Reached target cryptsetup.target. May 10 00:45:00.978114 systemd[1]: Starting lvm2-activation.service... May 10 00:45:00.981526 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:01.006694 systemd[1]: Finished lvm2-activation.service. May 10 00:45:01.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.008002 systemd[1]: Reached target local-fs-pre.target. May 10 00:45:01.009212 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:45:01.009245 systemd[1]: Reached target local-fs.target. May 10 00:45:01.010311 systemd[1]: Reached target machines.target. May 10 00:45:01.012424 systemd[1]: Starting ldconfig.service... May 10 00:45:01.013609 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:01.013665 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:01.014645 systemd[1]: Starting systemd-boot-update.service... May 10 00:45:01.016665 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:45:01.019482 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:45:01.022648 systemd[1]: Starting systemd-sysext.service... May 10 00:45:01.024098 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) May 10 00:45:01.026400 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:45:01.034683 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:45:01.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.096063 kernel: kauditd_printk_skb: 223 callbacks suppressed May 10 00:45:01.096179 kernel: audit: type=1130 audit(1746837901.086:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.096210 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:45:01.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.096291 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) May 10 00:45:01.096291 systemd-fsck[1053]: /dev/vda1: 790 files, 120688/258078 clusters May 10 00:45:01.052655 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:45:01.056973 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:45:01.057147 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:45:01.084371 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:45:01.088432 systemd[1]: Mounting boot.mount... May 10 00:45:01.467280 systemd[1]: Mounted boot.mount. May 10 00:45:01.473738 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:45:01.503057 systemd[1]: Finished systemd-boot-update.service. May 10 00:45:01.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.524740 kernel: audit: type=1130 audit(1746837901.516:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.535749 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:45:01.575254 (sd-sysext)[1059]: Using extensions 'kubernetes'. May 10 00:45:01.575603 (sd-sysext)[1059]: Merged extensions into '/usr'. May 10 00:45:01.591912 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:01.593546 systemd[1]: Mounting usr-share-oem.mount... May 10 00:45:01.600717 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:01.602878 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:01.605416 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:01.607789 systemd[1]: Starting modprobe@loop.service... May 10 00:45:01.609249 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:01.609534 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:01.609864 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:01.612783 systemd[1]: Mounted usr-share-oem.mount. May 10 00:45:01.614956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:01.615095 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:01.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.616679 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:01.616867 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:01.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.620894 kernel: audit: type=1130 audit(1746837901.615:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.620944 kernel: audit: type=1131 audit(1746837901.615:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.627769 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:45:01.628645 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:45:01.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.631728 kernel: audit: type=1130 audit(1746837901.625:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.631765 kernel: audit: type=1131 audit(1746837901.625:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.637486 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:01.637650 systemd[1]: Finished modprobe@loop.service. May 10 00:45:01.638424 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:45:01.647748 kernel: audit: type=1130 audit(1746837901.636:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.649538 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:01.649641 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:01.650887 systemd[1]: Finished systemd-sysext.service. May 10 00:45:01.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.653728 kernel: audit: type=1130 audit(1746837901.648:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.653788 kernel: audit: type=1131 audit(1746837901.648:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.659680 systemd[1]: Starting ensure-sysext.service... May 10 00:45:01.662784 kernel: audit: type=1130 audit(1746837901.657:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.664547 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:45:01.667525 systemd[1]: Reloading. May 10 00:45:01.679973 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:45:01.683032 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:45:01.687613 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:45:01.719251 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-05-10T00:45:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:01.719292 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-05-10T00:45:01Z" level=info msg="torcx already run" May 10 00:45:01.798221 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:01.798246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:01.816600 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:01.873000 audit: BPF prog-id=24 op=LOAD May 10 00:45:01.873000 audit: BPF prog-id=20 op=UNLOAD May 10 00:45:01.874000 audit: BPF prog-id=25 op=LOAD May 10 00:45:01.874000 audit: BPF prog-id=21 op=UNLOAD May 10 00:45:01.874000 audit: BPF prog-id=26 op=LOAD May 10 00:45:01.874000 audit: BPF prog-id=27 op=LOAD May 10 00:45:01.874000 audit: BPF prog-id=22 op=UNLOAD May 10 00:45:01.874000 audit: BPF prog-id=23 op=UNLOAD May 10 00:45:01.876000 audit: BPF prog-id=28 op=LOAD May 10 00:45:01.877000 audit: BPF prog-id=29 op=LOAD May 10 00:45:01.877000 audit: BPF prog-id=18 op=UNLOAD May 10 00:45:01.877000 audit: BPF prog-id=19 op=UNLOAD May 10 00:45:01.877000 audit: BPF prog-id=30 op=LOAD May 10 00:45:01.877000 audit: BPF prog-id=15 op=UNLOAD May 10 00:45:01.877000 audit: BPF prog-id=31 op=LOAD May 10 00:45:01.877000 audit: BPF prog-id=32 op=LOAD May 10 00:45:01.877000 audit: BPF prog-id=16 op=UNLOAD May 10 00:45:01.877000 audit: BPF prog-id=17 op=UNLOAD May 10 00:45:01.880489 systemd[1]: Finished ldconfig.service. May 10 00:45:01.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.881788 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:45:01.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.886935 systemd[1]: Starting audit-rules.service... May 10 00:45:01.889044 systemd[1]: Starting clean-ca-certificates.service... May 10 00:45:01.891674 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:45:01.893000 audit: BPF prog-id=33 op=LOAD May 10 00:45:01.895163 systemd[1]: Starting systemd-resolved.service... May 10 00:45:01.896000 audit: BPF prog-id=34 op=LOAD May 10 00:45:01.897895 systemd[1]: Starting systemd-timesyncd.service... May 10 00:45:01.900284 systemd[1]: Starting systemd-update-utmp.service... May 10 00:45:01.901925 systemd[1]: Finished clean-ca-certificates.service. May 10 00:45:01.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.904000 audit[1139]: SYSTEM_BOOT pid=1139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:45:01.909415 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:01.912196 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:01.915260 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:01.918747 systemd[1]: Starting modprobe@loop.service... May 10 00:45:01.919752 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:01.919880 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:01.920051 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:01.921768 systemd[1]: Finished systemd-update-utmp.service. May 10 00:45:01.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.923832 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:45:01.925626 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:01.925895 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:01.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:01.926000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:45:01.926000 audit[1151]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7938b690 a2=420 a3=0 items=0 ppid=1128 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.926000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:45:01.927794 augenrules[1151]: No rules May 10 00:45:01.927924 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:01.928096 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:01.929582 systemd[1]: Finished audit-rules.service. May 10 00:45:01.930856 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:01.930997 systemd[1]: Finished modprobe@loop.service. May 10 00:45:01.935149 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:01.936866 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:01.938942 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:01.940980 systemd[1]: Starting modprobe@loop.service... May 10 00:45:01.941902 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:01.942034 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:01.943390 systemd[1]: Starting systemd-update-done.service... May 10 00:45:01.944378 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:01.945535 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:01.945692 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:01.947212 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:01.947410 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:01.948901 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:01.949040 systemd[1]: Finished modprobe@loop.service. May 10 00:45:01.950310 systemd[1]: Finished systemd-update-done.service. May 10 00:45:01.954760 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:01.956200 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:01.958042 systemd[1]: Starting modprobe@drm.service... May 10 00:45:01.960078 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:01.962294 systemd[1]: Starting modprobe@loop.service... May 10 00:45:01.963221 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:01.963360 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:01.964861 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:45:01.966037 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:01.967679 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:01.967946 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:01.969516 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:45:01.969683 systemd[1]: Finished modprobe@drm.service. May 10 00:45:01.971361 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:01.971575 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:01.973046 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:01.973196 systemd[1]: Finished modprobe@loop.service. May 10 00:45:01.974815 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:01.974936 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:01.976699 systemd[1]: Finished ensure-sysext.service. May 10 00:45:01.981163 systemd[1]: Started systemd-timesyncd.service. May 10 00:45:01.982462 systemd[1]: Reached target time-set.target. May 10 00:45:01.982802 systemd-timesyncd[1138]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:45:01.983061 systemd-timesyncd[1138]: Initial clock synchronization to Sat 2025-05-10 00:45:02.052875 UTC. May 10 00:45:01.988573 systemd-resolved[1135]: Positive Trust Anchors: May 10 00:45:01.988588 systemd-resolved[1135]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:45:01.988613 systemd-resolved[1135]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:45:01.995695 systemd-resolved[1135]: Defaulting to hostname 'linux'. May 10 00:45:01.997386 systemd[1]: Started systemd-resolved.service. May 10 00:45:01.998566 systemd[1]: Reached target network.target. May 10 00:45:02.022683 systemd[1]: Reached target nss-lookup.target. May 10 00:45:02.023746 systemd[1]: Reached target sysinit.target. May 10 00:45:02.024697 systemd[1]: Started motdgen.path. May 10 00:45:02.056855 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:45:02.058279 systemd[1]: Started logrotate.timer. May 10 00:45:02.059124 systemd[1]: Started mdadm.timer. May 10 00:45:02.059857 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:45:02.060884 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:45:02.060917 systemd[1]: Reached target paths.target. May 10 00:45:02.061835 systemd[1]: Reached target timers.target. May 10 00:45:02.063063 systemd[1]: Listening on dbus.socket. May 10 00:45:02.065347 systemd[1]: Starting docker.socket... May 10 00:45:02.068560 systemd[1]: Listening on sshd.socket. May 10 00:45:02.069500 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:02.071164 systemd[1]: Listening on docker.socket. May 10 00:45:02.072851 systemd[1]: Reached target sockets.target. May 10 00:45:02.073725 systemd[1]: Reached target basic.target. May 10 00:45:02.074566 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:02.074612 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:02.074641 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:02.075865 systemd[1]: Starting containerd.service... May 10 00:45:02.077753 systemd[1]: Starting dbus.service... May 10 00:45:02.079634 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:45:02.081617 systemd[1]: Starting extend-filesystems.service... May 10 00:45:02.100926 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:45:02.101961 jq[1170]: false May 10 00:45:02.102279 systemd[1]: Starting motdgen.service... May 10 00:45:02.104492 systemd[1]: Starting prepare-helm.service... May 10 00:45:02.106503 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:45:02.109262 systemd[1]: Starting sshd-keygen.service... May 10 00:45:02.112596 extend-filesystems[1171]: Found loop1 May 10 00:45:02.112596 extend-filesystems[1171]: Found sr0 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda May 10 00:45:02.112596 extend-filesystems[1171]: Found vda1 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda2 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda3 May 10 00:45:02.112596 extend-filesystems[1171]: Found usr May 10 00:45:02.112596 extend-filesystems[1171]: Found vda4 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda6 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda7 May 10 00:45:02.112596 extend-filesystems[1171]: Found vda9 May 10 00:45:02.112596 extend-filesystems[1171]: Checking size of /dev/vda9 May 10 00:45:02.179175 extend-filesystems[1171]: Resized partition /dev/vda9 May 10 00:45:02.127820 systemd[1]: Starting systemd-logind.service... May 10 00:45:02.143318 dbus-daemon[1169]: [system] SELinux support is enabled May 10 00:45:02.180785 extend-filesystems[1201]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:45:02.128550 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:02.128630 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:45:02.129263 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:45:02.182495 jq[1188]: true May 10 00:45:02.130269 systemd[1]: Starting update-engine.service... May 10 00:45:02.134204 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:45:02.182860 tar[1192]: linux-amd64/helm May 10 00:45:02.137289 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:02.183158 jq[1193]: true May 10 00:45:02.139923 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:45:02.140144 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:45:02.141345 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:45:02.141534 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:45:02.144900 systemd[1]: Started dbus.service. May 10 00:45:02.151287 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:45:02.151323 systemd[1]: Reached target system-config.target. May 10 00:45:02.152672 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:45:02.152688 systemd[1]: Reached target user-config.target. May 10 00:45:02.154811 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:45:02.155005 systemd[1]: Finished motdgen.service. May 10 00:45:02.193199 env[1196]: time="2025-05-10T00:45:02.193142712Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:45:02.205741 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:45:02.221900 env[1196]: time="2025-05-10T00:45:02.219864355Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:45:02.222259 env[1196]: time="2025-05-10T00:45:02.222211457Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.224093 env[1196]: time="2025-05-10T00:45:02.224026759Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:02.224093 env[1196]: time="2025-05-10T00:45:02.224085063Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.224616 env[1196]: time="2025-05-10T00:45:02.224420624Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:02.224616 env[1196]: time="2025-05-10T00:45:02.224450216Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.224616 env[1196]: time="2025-05-10T00:45:02.224466336Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:45:02.224616 env[1196]: time="2025-05-10T00:45:02.224480253Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.224616 env[1196]: time="2025-05-10T00:45:02.224571667Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.226924 env[1196]: time="2025-05-10T00:45:02.226881921Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:02.227293 env[1196]: time="2025-05-10T00:45:02.227266377Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:02.227398 env[1196]: time="2025-05-10T00:45:02.227376711Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:45:02.227579 env[1196]: time="2025-05-10T00:45:02.227555234Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:45:02.227678 env[1196]: time="2025-05-10T00:45:02.227657938Z" level=info msg="metadata content store policy set" policy=shared May 10 00:45:02.230234 update_engine[1185]: I0510 00:45:02.230069 1185 main.cc:92] Flatcar Update Engine starting May 10 00:45:02.247951 update_engine[1185]: I0510 00:45:02.232246 1185 update_check_scheduler.cc:74] Next update check in 9m44s May 10 00:45:02.232251 systemd[1]: Started update-engine.service. May 10 00:45:02.236231 systemd[1]: Started locksmithd.service. May 10 00:45:02.245878 systemd-logind[1181]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:45:02.245901 systemd-logind[1181]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:45:02.247107 systemd-logind[1181]: New seat seat0. May 10 00:45:02.255276 systemd[1]: Started systemd-logind.service. May 10 00:45:02.262871 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:45:02.315165 extend-filesystems[1201]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:45:02.315165 extend-filesystems[1201]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:45:02.315165 extend-filesystems[1201]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:45:02.323029 extend-filesystems[1171]: Resized filesystem in /dev/vda9 May 10 00:45:02.328907 bash[1219]: Updated "/home/core/.ssh/authorized_keys" May 10 00:45:02.316096 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324202795Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324259342Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324275775Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324320315Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324339356Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324355113Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324371354Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324407717Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324426222Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324442999Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324464172Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324479484Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324623949Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:45:02.329121 env[1196]: time="2025-05-10T00:45:02.324724641Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:45:02.316349 systemd[1]: Finished extend-filesystems.service. May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325034348Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325064708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325080778Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325132665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325147826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325165269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325183310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325209072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325224089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325239371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325253672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325272046Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325411083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325429093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:45:02.329636 env[1196]: time="2025-05-10T00:45:02.325443454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:45:02.319109 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:45:02.330080 env[1196]: time="2025-05-10T00:45:02.325457341Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:45:02.330080 env[1196]: time="2025-05-10T00:45:02.325478726Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:45:02.330080 env[1196]: time="2025-05-10T00:45:02.325492896Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:45:02.330080 env[1196]: time="2025-05-10T00:45:02.325518405Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:45:02.330080 env[1196]: time="2025-05-10T00:45:02.325562783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:45:02.327541 systemd[1]: Started containerd.service. May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.325813711Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.325879939Z" level=info msg="Connect containerd service" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.325924711Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.326526804Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.326844546Z" level=info msg="Start subscribing containerd event" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.326924610Z" level=info msg="Start recovering state" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327014893Z" level=info msg="Start event monitor" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327032408Z" level=info msg="Start snapshots syncer" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327064072Z" level=info msg="Start cni network conf syncer for default" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327081425Z" level=info msg="Start streaming server" May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327332706Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327375053Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:45:02.330295 env[1196]: time="2025-05-10T00:45:02.327600946Z" level=info msg="containerd successfully booted in 0.136284s" May 10 00:45:02.352474 locksmithd[1226]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:45:02.732901 systemd-networkd[1021]: eth0: Gained IPv6LL May 10 00:45:02.735450 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:45:02.737304 systemd[1]: Reached target network-online.target. May 10 00:45:02.740700 systemd[1]: Starting kubelet.service... May 10 00:45:03.144454 tar[1192]: linux-amd64/LICENSE May 10 00:45:03.144770 tar[1192]: linux-amd64/README.md May 10 00:45:03.149872 systemd[1]: Finished prepare-helm.service. May 10 00:45:03.427915 sshd_keygen[1194]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:45:03.457381 systemd[1]: Finished sshd-keygen.service. May 10 00:45:03.460072 systemd[1]: Starting issuegen.service... May 10 00:45:03.467145 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:45:03.467357 systemd[1]: Finished issuegen.service. May 10 00:45:03.470431 systemd[1]: Starting systemd-user-sessions.service... May 10 00:45:03.499419 systemd[1]: Finished systemd-user-sessions.service. May 10 00:45:03.502856 systemd[1]: Started getty@tty1.service. May 10 00:45:03.505520 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:45:03.506840 systemd[1]: Reached target getty.target. May 10 00:45:04.234983 systemd[1]: Started kubelet.service. May 10 00:45:04.239211 systemd[1]: Reached target multi-user.target. May 10 00:45:04.243997 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:45:04.252340 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:45:04.252567 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:45:04.275874 systemd[1]: Startup finished in 919ms (kernel) + 4.605s (initrd) + 7.903s (userspace) = 13.428s. May 10 00:45:04.511718 systemd[1]: Created slice system-sshd.slice. May 10 00:45:04.512914 systemd[1]: Started sshd@0-10.0.0.118:22-10.0.0.1:42362.service. May 10 00:45:04.559634 sshd[1259]: Accepted publickey for core from 10.0.0.1 port 42362 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:04.588431 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:04.599552 systemd-logind[1181]: New session 1 of user core. May 10 00:45:04.600923 systemd[1]: Created slice user-500.slice. May 10 00:45:04.602556 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:45:04.610242 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:45:04.613175 systemd[1]: Starting user@500.service... May 10 00:45:04.616472 (systemd)[1262]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:04.752079 systemd[1262]: Queued start job for default target default.target. May 10 00:45:04.752607 systemd[1262]: Reached target paths.target. May 10 00:45:04.752650 systemd[1262]: Reached target sockets.target. May 10 00:45:04.752666 systemd[1262]: Reached target timers.target. May 10 00:45:04.752681 systemd[1262]: Reached target basic.target. May 10 00:45:04.752860 systemd[1]: Started user@500.service. May 10 00:45:04.753774 systemd[1262]: Reached target default.target. May 10 00:45:04.753824 systemd[1262]: Startup finished in 128ms. May 10 00:45:04.754087 systemd[1]: Started session-1.scope. May 10 00:45:04.823528 systemd[1]: Started sshd@1-10.0.0.118:22-10.0.0.1:42364.service. May 10 00:45:04.904031 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 42364 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:04.905867 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:04.909744 systemd-logind[1181]: New session 2 of user core. May 10 00:45:04.910511 systemd[1]: Started session-2.scope. May 10 00:45:04.970784 sshd[1272]: pam_unix(sshd:session): session closed for user core May 10 00:45:04.973798 systemd[1]: sshd@1-10.0.0.118:22-10.0.0.1:42364.service: Deactivated successfully. May 10 00:45:04.974383 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:45:04.974908 systemd-logind[1181]: Session 2 logged out. Waiting for processes to exit. May 10 00:45:04.975963 systemd[1]: Started sshd@2-10.0.0.118:22-10.0.0.1:42374.service. May 10 00:45:04.976695 systemd-logind[1181]: Removed session 2. May 10 00:45:05.013973 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 42374 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:05.015725 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:05.020035 systemd-logind[1181]: New session 3 of user core. May 10 00:45:05.020908 systemd[1]: Started session-3.scope. May 10 00:45:05.072795 sshd[1279]: pam_unix(sshd:session): session closed for user core May 10 00:45:05.076607 systemd[1]: Started sshd@3-10.0.0.118:22-10.0.0.1:42384.service. May 10 00:45:05.077085 systemd[1]: sshd@2-10.0.0.118:22-10.0.0.1:42374.service: Deactivated successfully. May 10 00:45:05.077613 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:45:05.078383 systemd-logind[1181]: Session 3 logged out. Waiting for processes to exit. May 10 00:45:05.079423 systemd-logind[1181]: Removed session 3. May 10 00:45:05.101493 kubelet[1251]: E0510 00:45:05.101430 1251 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:05.103226 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:05.103347 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:05.103565 systemd[1]: kubelet.service: Consumed 2.161s CPU time. May 10 00:45:05.117052 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 42384 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:05.118352 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:05.121771 systemd-logind[1181]: New session 4 of user core. May 10 00:45:05.122843 systemd[1]: Started session-4.scope. May 10 00:45:05.177148 sshd[1284]: pam_unix(sshd:session): session closed for user core May 10 00:45:05.180091 systemd[1]: sshd@3-10.0.0.118:22-10.0.0.1:42384.service: Deactivated successfully. May 10 00:45:05.180741 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:45:05.181268 systemd-logind[1181]: Session 4 logged out. Waiting for processes to exit. May 10 00:45:05.182486 systemd[1]: Started sshd@4-10.0.0.118:22-10.0.0.1:42396.service. May 10 00:45:05.183265 systemd-logind[1181]: Removed session 4. May 10 00:45:05.220519 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 42396 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:05.221687 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:05.226508 systemd-logind[1181]: New session 5 of user core. May 10 00:45:05.227863 systemd[1]: Started session-5.scope. May 10 00:45:05.288431 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:45:05.288619 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:45:05.298022 dbus-daemon[1169]: \xd0Md\x81KV: received setenforce notice (enforcing=-278425712) May 10 00:45:05.300382 sudo[1294]: pam_unix(sudo:session): session closed for user root May 10 00:45:05.302879 sshd[1291]: pam_unix(sshd:session): session closed for user core May 10 00:45:05.306628 systemd[1]: sshd@4-10.0.0.118:22-10.0.0.1:42396.service: Deactivated successfully. May 10 00:45:05.307224 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:45:05.307987 systemd-logind[1181]: Session 5 logged out. Waiting for processes to exit. May 10 00:45:05.309336 systemd[1]: Started sshd@5-10.0.0.118:22-10.0.0.1:42398.service. May 10 00:45:05.310123 systemd-logind[1181]: Removed session 5. May 10 00:45:05.354583 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 42398 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:05.356044 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:05.360362 systemd-logind[1181]: New session 6 of user core. May 10 00:45:05.361405 systemd[1]: Started session-6.scope. May 10 00:45:05.417656 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:45:05.417926 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:45:05.421210 sudo[1302]: pam_unix(sudo:session): session closed for user root May 10 00:45:05.426608 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:45:05.426840 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:45:05.437441 systemd[1]: Stopping audit-rules.service... May 10 00:45:05.438000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:45:05.438000 audit[1305]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc08acc40 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.438000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:45:05.438971 auditctl[1305]: No rules May 10 00:45:05.439112 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:45:05.439238 systemd[1]: Stopped audit-rules.service. May 10 00:45:05.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.440856 systemd[1]: Starting audit-rules.service... May 10 00:45:05.462992 augenrules[1322]: No rules May 10 00:45:05.463658 systemd[1]: Finished audit-rules.service. May 10 00:45:05.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.464638 sudo[1301]: pam_unix(sudo:session): session closed for user root May 10 00:45:05.463000 audit[1301]: USER_END pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:05.464000 audit[1301]: CRED_DISP pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:05.466204 sshd[1298]: pam_unix(sshd:session): session closed for user core May 10 00:45:05.466000 audit[1298]: USER_END pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.466000 audit[1298]: CRED_DISP pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.468845 systemd[1]: sshd@5-10.0.0.118:22-10.0.0.1:42398.service: Deactivated successfully. May 10 00:45:05.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.118:22-10.0.0.1:42398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.469320 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:45:05.469767 systemd-logind[1181]: Session 6 logged out. Waiting for processes to exit. May 10 00:45:05.470749 systemd[1]: Started sshd@6-10.0.0.118:22-10.0.0.1:42406.service. May 10 00:45:05.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:42406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.471601 systemd-logind[1181]: Removed session 6. May 10 00:45:05.510000 audit[1328]: USER_ACCT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.512817 sshd[1328]: Accepted publickey for core from 10.0.0.1 port 42406 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:45:05.512000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.512000 audit[1328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffced997460 a2=3 a3=0 items=0 ppid=1 pid=1328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:05.514078 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:05.517798 systemd-logind[1181]: New session 7 of user core. May 10 00:45:05.519278 systemd[1]: Started session-7.scope. May 10 00:45:05.521000 audit[1328]: USER_START pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.522000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:05.571000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:05.572000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:05.572631 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:45:05.572886 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:45:05.573000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:05.616698 systemd[1]: Starting docker.service... May 10 00:45:05.739092 env[1342]: time="2025-05-10T00:45:05.739030480Z" level=info msg="Starting up" May 10 00:45:05.740504 env[1342]: time="2025-05-10T00:45:05.740460083Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:45:05.740504 env[1342]: time="2025-05-10T00:45:05.740483503Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:45:05.740570 env[1342]: time="2025-05-10T00:45:05.740504354Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:45:05.740570 env[1342]: time="2025-05-10T00:45:05.740520650Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:45:05.742389 env[1342]: time="2025-05-10T00:45:05.742345638Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:45:05.742389 env[1342]: time="2025-05-10T00:45:05.742371216Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:45:05.742389 env[1342]: time="2025-05-10T00:45:05.742390051Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:45:05.742389 env[1342]: time="2025-05-10T00:45:05.742398949Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:45:07.032419 env[1342]: time="2025-05-10T00:45:07.032282548Z" level=info msg="Loading containers: start." May 10 00:45:07.086000 audit[1376]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.087830 kernel: kauditd_printk_skb: 52 callbacks suppressed May 10 00:45:07.087895 kernel: audit: type=1325 audit(1746837907.086:202): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.086000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcafbc24f0 a2=0 a3=7ffcafbc24dc items=0 ppid=1342 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.095286 kernel: audit: type=1300 audit(1746837907.086:202): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcafbc24f0 a2=0 a3=7ffcafbc24dc items=0 ppid=1342 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.095332 kernel: audit: type=1327 audit(1746837907.086:202): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:45:07.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:45:07.097224 kernel: audit: type=1325 audit(1746837907.088:203): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.088000 audit[1378]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.099398 kernel: audit: type=1300 audit(1746837907.088:203): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd9833a330 a2=0 a3=7ffd9833a31c items=0 ppid=1342 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.088000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd9833a330 a2=0 a3=7ffd9833a31c items=0 ppid=1342 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.104339 kernel: audit: type=1327 audit(1746837907.088:203): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:45:07.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:45:07.106732 kernel: audit: type=1325 audit(1746837907.089:204): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.089000 audit[1380]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.109218 kernel: audit: type=1300 audit(1746837907.089:204): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff68b8d040 a2=0 a3=7fff68b8d02c items=0 ppid=1342 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.089000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff68b8d040 a2=0 a3=7fff68b8d02c items=0 ppid=1342 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.113993 kernel: audit: type=1327 audit(1746837907.089:204): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:45:07.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:45:07.116571 kernel: audit: type=1325 audit(1746837907.091:205): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.091000 audit[1382]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.091000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc4c6d8680 a2=0 a3=7ffc4c6d866c items=0 ppid=1342 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:45:07.093000 audit[1384]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.093000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff67dad710 a2=0 a3=7fff67dad6fc items=0 ppid=1342 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:45:07.140000 audit[1389]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.140000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc740c6f30 a2=0 a3=7ffc740c6f1c items=0 ppid=1342 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:45:07.151000 audit[1391]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.151000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc85558f40 a2=0 a3=7ffc85558f2c items=0 ppid=1342 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:45:07.153000 audit[1393]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.153000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff0d3479c0 a2=0 a3=7fff0d3479ac items=0 ppid=1342 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:45:07.155000 audit[1395]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.155000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcaf3389c0 a2=0 a3=7ffcaf3389ac items=0 ppid=1342 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.155000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:45:07.170000 audit[1399]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.170000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffde5a692a0 a2=0 a3=7ffde5a6928c items=0 ppid=1342 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:45:07.176000 audit[1400]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.176000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd72fdeb80 a2=0 a3=7ffd72fdeb6c items=0 ppid=1342 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:45:07.185722 kernel: Initializing XFRM netlink socket May 10 00:45:07.214572 env[1342]: time="2025-05-10T00:45:07.214524274Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:45:07.230000 audit[1408]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.230000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffed89a8fb0 a2=0 a3=7ffed89a8f9c items=0 ppid=1342 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.230000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:45:07.242000 audit[1411]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.242000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc84a46550 a2=0 a3=7ffc84a4653c items=0 ppid=1342 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:45:07.244000 audit[1414]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.244000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc775e7f20 a2=0 a3=7ffc775e7f0c items=0 ppid=1342 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:45:07.247000 audit[1416]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.247000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffafd6d8c0 a2=0 a3=7fffafd6d8ac items=0 ppid=1342 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:45:07.249000 audit[1418]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.249000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc5aabf210 a2=0 a3=7ffc5aabf1fc items=0 ppid=1342 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:45:07.251000 audit[1420]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.251000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffb4c7c1f0 a2=0 a3=7fffb4c7c1dc items=0 ppid=1342 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.251000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:45:07.253000 audit[1422]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.253000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe3f914970 a2=0 a3=7ffe3f91495c items=0 ppid=1342 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.253000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:45:07.260000 audit[1425]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.260000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe38c80ae0 a2=0 a3=7ffe38c80acc items=0 ppid=1342 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:45:07.262000 audit[1427]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.262000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdeb96ef60 a2=0 a3=7ffdeb96ef4c items=0 ppid=1342 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.262000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:45:07.264000 audit[1429]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.264000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc8faf9680 a2=0 a3=7ffc8faf966c items=0 ppid=1342 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:45:07.266000 audit[1431]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.266000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd58411aa0 a2=0 a3=7ffd58411a8c items=0 ppid=1342 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:45:07.267167 systemd-networkd[1021]: docker0: Link UP May 10 00:45:07.280000 audit[1435]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.280000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2bc3dae0 a2=0 a3=7ffd2bc3dacc items=0 ppid=1342 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:45:07.288000 audit[1436]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:07.288000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffd9c768a0 a2=0 a3=7fffd9c7688c items=0 ppid=1342 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.288000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:45:07.289604 env[1342]: time="2025-05-10T00:45:07.289567157Z" level=info msg="Loading containers: done." May 10 00:45:07.309775 env[1342]: time="2025-05-10T00:45:07.309720262Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:45:07.309948 env[1342]: time="2025-05-10T00:45:07.309924568Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:45:07.310045 env[1342]: time="2025-05-10T00:45:07.310021050Z" level=info msg="Daemon has completed initialization" May 10 00:45:07.331596 systemd[1]: Started docker.service. May 10 00:45:07.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:07.339058 env[1342]: time="2025-05-10T00:45:07.338960414Z" level=info msg="API listen on /run/docker.sock" May 10 00:45:08.628612 env[1196]: time="2025-05-10T00:45:08.628556989Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:45:11.836351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4161206267.mount: Deactivated successfully. May 10 00:45:15.354223 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:45:15.354417 systemd[1]: Stopped kubelet.service. May 10 00:45:15.354472 systemd[1]: kubelet.service: Consumed 2.161s CPU time. May 10 00:45:15.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.356051 systemd[1]: Starting kubelet.service... May 10 00:45:15.358816 kernel: kauditd_printk_skb: 63 callbacks suppressed May 10 00:45:15.358868 kernel: audit: type=1130 audit(1746837915.353:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.365801 kernel: audit: type=1131 audit(1746837915.353:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.584883 systemd[1]: Started kubelet.service. May 10 00:45:15.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.602823 kernel: audit: type=1130 audit(1746837915.584:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:15.729209 kubelet[1485]: E0510 00:45:15.729072 1485 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:15.732798 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:15.732906 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:15.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:15.755736 kernel: audit: type=1131 audit(1746837915.732:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:16.614565 env[1196]: time="2025-05-10T00:45:16.614472759Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.626613 env[1196]: time="2025-05-10T00:45:16.626536876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.633552 env[1196]: time="2025-05-10T00:45:16.633471609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.645531 env[1196]: time="2025-05-10T00:45:16.645468247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.646534 env[1196]: time="2025-05-10T00:45:16.646468933Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:45:16.658372 env[1196]: time="2025-05-10T00:45:16.658319520Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:45:20.164249 env[1196]: time="2025-05-10T00:45:20.164154138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.244578 env[1196]: time="2025-05-10T00:45:20.244525535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.307356 env[1196]: time="2025-05-10T00:45:20.307272704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.354619 env[1196]: time="2025-05-10T00:45:20.354535311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.355722 env[1196]: time="2025-05-10T00:45:20.355639885Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:45:20.366630 env[1196]: time="2025-05-10T00:45:20.366579400Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:45:24.478264 env[1196]: time="2025-05-10T00:45:24.478194887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.562017 env[1196]: time="2025-05-10T00:45:24.561948200Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.586007 env[1196]: time="2025-05-10T00:45:24.585902313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.608606 env[1196]: time="2025-05-10T00:45:24.608527466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.609498 env[1196]: time="2025-05-10T00:45:24.609350581Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:45:24.624538 env[1196]: time="2025-05-10T00:45:24.624467964Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:45:25.811203 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:45:25.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:25.811375 systemd[1]: Stopped kubelet.service. May 10 00:45:25.813231 systemd[1]: Starting kubelet.service... May 10 00:45:25.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:25.819951 kernel: audit: type=1130 audit(1746837925.809:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:25.820040 kernel: audit: type=1131 audit(1746837925.809:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:25.904067 systemd[1]: Started kubelet.service. May 10 00:45:25.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:25.909720 kernel: audit: type=1130 audit(1746837925.902:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:26.230046 kubelet[1518]: E0510 00:45:26.229983 1518 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:26.232435 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:26.232638 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:26.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:26.236783 kernel: audit: type=1131 audit(1746837926.232:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:26.500437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount565284063.mount: Deactivated successfully. May 10 00:45:28.101928 env[1196]: time="2025-05-10T00:45:28.101859708Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.158682 env[1196]: time="2025-05-10T00:45:28.158617109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.189999 env[1196]: time="2025-05-10T00:45:28.189868049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.213163 env[1196]: time="2025-05-10T00:45:28.213088262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.213882 env[1196]: time="2025-05-10T00:45:28.213840558Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:45:28.224563 env[1196]: time="2025-05-10T00:45:28.224501932Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:45:31.138602 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3500729552.mount: Deactivated successfully. May 10 00:45:33.685717 env[1196]: time="2025-05-10T00:45:33.685642078Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:33.687826 env[1196]: time="2025-05-10T00:45:33.687791219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:33.689636 env[1196]: time="2025-05-10T00:45:33.689608330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:33.691537 env[1196]: time="2025-05-10T00:45:33.691494250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:33.692253 env[1196]: time="2025-05-10T00:45:33.692220694Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:45:33.701602 env[1196]: time="2025-05-10T00:45:33.701556246Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:45:34.364257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1576231108.mount: Deactivated successfully. May 10 00:45:34.371157 env[1196]: time="2025-05-10T00:45:34.371072626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:34.373640 env[1196]: time="2025-05-10T00:45:34.373563049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:34.375527 env[1196]: time="2025-05-10T00:45:34.375497513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:34.377965 env[1196]: time="2025-05-10T00:45:34.377933318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:34.378752 env[1196]: time="2025-05-10T00:45:34.378678808Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:45:34.391242 env[1196]: time="2025-05-10T00:45:34.391190234Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:45:34.939091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1331435052.mount: Deactivated successfully. May 10 00:45:36.321988 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 00:45:36.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.322206 systemd[1]: Stopped kubelet.service. May 10 00:45:36.324027 systemd[1]: Starting kubelet.service... May 10 00:45:36.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.351611 kernel: audit: type=1130 audit(1746837936.321:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.351658 kernel: audit: type=1131 audit(1746837936.321:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.414689 systemd[1]: Started kubelet.service. May 10 00:45:36.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.419729 kernel: audit: type=1130 audit(1746837936.414:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.525631 kubelet[1548]: E0510 00:45:36.525570 1548 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:36.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:36.527028 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:36.527131 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:36.536726 kernel: audit: type=1131 audit(1746837936.526:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:42.548569 env[1196]: time="2025-05-10T00:45:42.548499376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.651155 env[1196]: time="2025-05-10T00:45:42.651066676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.672227 env[1196]: time="2025-05-10T00:45:42.672161785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.688133 env[1196]: time="2025-05-10T00:45:42.688013798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.689252 env[1196]: time="2025-05-10T00:45:42.689173041Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:45:45.226050 systemd[1]: Stopped kubelet.service. May 10 00:45:45.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.228844 systemd[1]: Starting kubelet.service... May 10 00:45:45.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.233418 kernel: audit: type=1130 audit(1746837945.225:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.233512 kernel: audit: type=1131 audit(1746837945.225:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.252143 systemd[1]: Reloading. May 10 00:45:45.316399 /usr/lib/systemd/system-generators/torcx-generator[1655]: time="2025-05-10T00:45:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:45.316858 /usr/lib/systemd/system-generators/torcx-generator[1655]: time="2025-05-10T00:45:45Z" level=info msg="torcx already run" May 10 00:45:45.643942 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:45.643964 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:45.668168 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:45.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758365 kernel: audit: type=1400 audit(1746837945.749:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758437 kernel: audit: type=1400 audit(1746837945.749:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758462 kernel: audit: type=1400 audit(1746837945.749:243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.762107 kernel: audit: type=1400 audit(1746837945.749:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.769525 kernel: audit: type=1400 audit(1746837945.749:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.769600 kernel: audit: type=1400 audit(1746837945.749:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.773392 kernel: audit: type=1400 audit(1746837945.749:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.777189 kernel: audit: type=1400 audit(1746837945.749:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.757000 audit: BPF prog-id=40 op=LOAD May 10 00:45:45.757000 audit: BPF prog-id=24 op=UNLOAD May 10 00:45:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit: BPF prog-id=41 op=LOAD May 10 00:45:45.765000 audit: BPF prog-id=25 op=UNLOAD May 10 00:45:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit: BPF prog-id=42 op=LOAD May 10 00:45:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit: BPF prog-id=43 op=LOAD May 10 00:45:45.776000 audit: BPF prog-id=26 op=UNLOAD May 10 00:45:45.776000 audit: BPF prog-id=27 op=UNLOAD May 10 00:45:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.780000 audit: BPF prog-id=44 op=LOAD May 10 00:45:45.780000 audit: BPF prog-id=33 op=UNLOAD May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit: BPF prog-id=45 op=LOAD May 10 00:45:45.781000 audit: BPF prog-id=35 op=UNLOAD May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.781000 audit: BPF prog-id=46 op=LOAD May 10 00:45:45.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.782000 audit: BPF prog-id=47 op=LOAD May 10 00:45:45.782000 audit: BPF prog-id=36 op=UNLOAD May 10 00:45:45.782000 audit: BPF prog-id=37 op=UNLOAD May 10 00:45:45.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.786000 audit: BPF prog-id=48 op=LOAD May 10 00:45:45.786000 audit: BPF prog-id=34 op=UNLOAD May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit: BPF prog-id=49 op=LOAD May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.787000 audit: BPF prog-id=50 op=LOAD May 10 00:45:45.787000 audit: BPF prog-id=28 op=UNLOAD May 10 00:45:45.787000 audit: BPF prog-id=29 op=UNLOAD May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit: BPF prog-id=51 op=LOAD May 10 00:45:45.788000 audit: BPF prog-id=30 op=UNLOAD May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit: BPF prog-id=52 op=LOAD May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.788000 audit: BPF prog-id=53 op=LOAD May 10 00:45:45.788000 audit: BPF prog-id=31 op=UNLOAD May 10 00:45:45.788000 audit: BPF prog-id=32 op=UNLOAD May 10 00:45:45.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:45.790000 audit: BPF prog-id=54 op=LOAD May 10 00:45:45.790000 audit: BPF prog-id=38 op=UNLOAD May 10 00:45:45.803074 systemd[1]: Started kubelet.service. May 10 00:45:45.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.805019 systemd[1]: Stopping kubelet.service... May 10 00:45:45.805321 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:45:45.805506 systemd[1]: Stopped kubelet.service. May 10 00:45:45.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.807240 systemd[1]: Starting kubelet.service... May 10 00:45:45.883643 systemd[1]: Started kubelet.service. May 10 00:45:45.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:45.959445 kubelet[1704]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:45.959445 kubelet[1704]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:45:45.959445 kubelet[1704]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:45.959445 kubelet[1704]: I0510 00:45:45.959404 1704 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:45:46.195231 kubelet[1704]: I0510 00:45:46.195173 1704 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:45:46.195231 kubelet[1704]: I0510 00:45:46.195211 1704 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:45:46.195470 kubelet[1704]: I0510 00:45:46.195447 1704 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:45:46.212836 kubelet[1704]: I0510 00:45:46.212729 1704 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:45:46.213545 kubelet[1704]: E0510 00:45:46.213513 1704 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.260386 kubelet[1704]: I0510 00:45:46.260332 1704 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:45:46.274056 kubelet[1704]: I0510 00:45:46.273998 1704 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:45:46.274230 kubelet[1704]: I0510 00:45:46.274048 1704 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:45:46.282261 kubelet[1704]: I0510 00:45:46.282226 1704 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:45:46.282261 kubelet[1704]: I0510 00:45:46.282248 1704 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:45:46.285678 kubelet[1704]: I0510 00:45:46.285648 1704 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:46.286625 kubelet[1704]: I0510 00:45:46.286599 1704 kubelet.go:400] "Attempting to sync node with API server" May 10 00:45:46.286625 kubelet[1704]: I0510 00:45:46.286617 1704 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:45:46.286726 kubelet[1704]: I0510 00:45:46.286644 1704 kubelet.go:312] "Adding apiserver pod source" May 10 00:45:46.286726 kubelet[1704]: I0510 00:45:46.286668 1704 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:45:46.314441 kubelet[1704]: W0510 00:45:46.314368 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.314441 kubelet[1704]: E0510 00:45:46.314439 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.316623 kubelet[1704]: W0510 00:45:46.316566 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.316681 kubelet[1704]: E0510 00:45:46.316627 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.325624 kubelet[1704]: I0510 00:45:46.325572 1704 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:45:46.336484 kubelet[1704]: I0510 00:45:46.336419 1704 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:45:46.336558 kubelet[1704]: W0510 00:45:46.336543 1704 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:45:46.337294 kubelet[1704]: I0510 00:45:46.337249 1704 server.go:1264] "Started kubelet" May 10 00:45:46.337445 kubelet[1704]: I0510 00:45:46.337371 1704 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:45:46.337628 kubelet[1704]: I0510 00:45:46.337549 1704 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:45:46.337891 kubelet[1704]: I0510 00:45:46.337874 1704 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:45:46.338795 kubelet[1704]: I0510 00:45:46.338717 1704 server.go:455] "Adding debug handlers to kubelet server" May 10 00:45:46.338000 audit[1704]: AVC avc: denied { mac_admin } for pid=1704 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:46.338000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:46.338000 audit[1704]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b54540 a1=c000c91530 a2=c000b54510 a3=25 items=0 ppid=1 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:46.338000 audit[1704]: AVC avc: denied { mac_admin } for pid=1704 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:46.338000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:46.338000 audit[1704]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000421460 a1=c000c91548 a2=c000b545d0 a3=25 items=0 ppid=1 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:46.339623 kubelet[1704]: I0510 00:45:46.339167 1704 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:45:46.339623 kubelet[1704]: I0510 00:45:46.339223 1704 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:45:46.339623 kubelet[1704]: I0510 00:45:46.339279 1704 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:45:46.341997 kubelet[1704]: E0510 00:45:46.341605 1704 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:46.341997 kubelet[1704]: I0510 00:45:46.341658 1704 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:45:46.341997 kubelet[1704]: I0510 00:45:46.341836 1704 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:45:46.341997 kubelet[1704]: I0510 00:45:46.341911 1704 reconciler.go:26] "Reconciler: start to sync state" May 10 00:45:46.342359 kubelet[1704]: W0510 00:45:46.342310 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.342359 kubelet[1704]: E0510 00:45:46.342361 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.341000 audit[1716]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.341000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe67be7370 a2=0 a3=7ffe67be735c items=0 ppid=1704 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:45:46.342875 kubelet[1704]: E0510 00:45:46.342827 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="200ms" May 10 00:45:46.342000 audit[1717]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.342000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc01b342b0 a2=0 a3=7ffc01b3429c items=0 ppid=1704 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:45:46.344000 audit[1719]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.344000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7c9bfbd0 a2=0 a3=7ffd7c9bfbbc items=0 ppid=1704 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:46.345000 audit[1721]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.345000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe68578b40 a2=0 a3=7ffe68578b2c items=0 ppid=1704 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:46.348363 kubelet[1704]: E0510 00:45:46.348324 1704 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:45:46.348567 kubelet[1704]: I0510 00:45:46.348529 1704 factory.go:221] Registration of the systemd container factory successfully May 10 00:45:46.348647 kubelet[1704]: I0510 00:45:46.348622 1704 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:45:46.349390 kubelet[1704]: I0510 00:45:46.349370 1704 factory.go:221] Registration of the containerd container factory successfully May 10 00:45:46.349659 kubelet[1704]: E0510 00:45:46.349526 1704 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.118:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.118:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e03db679a5247 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:45:46.337219143 +0000 UTC m=+0.450000950,LastTimestamp:2025-05-10 00:45:46.337219143 +0000 UTC m=+0.450000950,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:45:46.354000 audit[1726]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.354000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff274e2330 a2=0 a3=7fff274e231c items=0 ppid=1704 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:45:46.355458 kubelet[1704]: I0510 00:45:46.355395 1704 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:45:46.355000 audit[1727]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:46.355000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb530d290 a2=0 a3=7ffeb530d27c items=0 ppid=1704 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:45:46.355000 audit[1728]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.355000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcec853230 a2=0 a3=7ffcec85321c items=0 ppid=1704 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:45:46.356768 kubelet[1704]: I0510 00:45:46.356600 1704 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:45:46.356768 kubelet[1704]: I0510 00:45:46.356633 1704 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:45:46.356768 kubelet[1704]: I0510 00:45:46.356657 1704 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:45:46.356768 kubelet[1704]: E0510 00:45:46.356712 1704 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:45:46.356000 audit[1729]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.356000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb1ed1c70 a2=0 a3=7ffcb1ed1c5c items=0 ppid=1704 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:45:46.356000 audit[1730]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:46.356000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe902c4e80 a2=0 a3=7ffe902c4e6c items=0 ppid=1704 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:45:46.357000 audit[1732]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:46.357000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf8722940 a2=0 a3=7ffdf872292c items=0 ppid=1704 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:45:46.357000 audit[1731]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:46.357000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe80349ff0 a2=0 a3=7ffe80349fdc items=0 ppid=1704 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:45:46.358000 audit[1734]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:46.358000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7bfadf30 a2=0 a3=7ffd7bfadf1c items=0 ppid=1704 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:45:46.360489 kubelet[1704]: W0510 00:45:46.360411 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.360544 kubelet[1704]: E0510 00:45:46.360494 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:46.363416 kubelet[1704]: I0510 00:45:46.363395 1704 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:45:46.363416 kubelet[1704]: I0510 00:45:46.363410 1704 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:45:46.363491 kubelet[1704]: I0510 00:45:46.363428 1704 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:46.443927 kubelet[1704]: I0510 00:45:46.443877 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:46.444247 kubelet[1704]: E0510 00:45:46.444221 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:46.457545 kubelet[1704]: E0510 00:45:46.457496 1704 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:46.543762 kubelet[1704]: E0510 00:45:46.543580 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="400ms" May 10 00:45:46.646162 kubelet[1704]: I0510 00:45:46.646121 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:46.646684 kubelet[1704]: E0510 00:45:46.646641 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:46.657917 kubelet[1704]: E0510 00:45:46.657846 1704 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:46.944405 kubelet[1704]: E0510 00:45:46.944328 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="800ms" May 10 00:45:47.047862 kubelet[1704]: I0510 00:45:47.047823 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:47.048233 kubelet[1704]: E0510 00:45:47.048105 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:47.058283 kubelet[1704]: E0510 00:45:47.058244 1704 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:47.343154 kubelet[1704]: W0510 00:45:47.343075 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.343154 kubelet[1704]: E0510 00:45:47.343154 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.621379 kubelet[1704]: W0510 00:45:47.621236 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.621379 kubelet[1704]: E0510 00:45:47.621292 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.672384 kubelet[1704]: W0510 00:45:47.672302 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.672384 kubelet[1704]: E0510 00:45:47.672382 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.745358 kubelet[1704]: E0510 00:45:47.745283 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="1.6s" May 10 00:45:47.975974 kubelet[1704]: W0510 00:45:47.820177 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.975974 kubelet[1704]: E0510 00:45:47.820245 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:47.975974 kubelet[1704]: I0510 00:45:47.849649 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:47.975974 kubelet[1704]: E0510 00:45:47.849999 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:47.975974 kubelet[1704]: E0510 00:45:47.859225 1704 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:47.976191 update_engine[1185]: I0510 00:45:47.862049 1185 update_attempter.cc:509] Updating boot flags... May 10 00:45:48.127503 kubelet[1704]: I0510 00:45:48.127439 1704 policy_none.go:49] "None policy: Start" May 10 00:45:48.128280 kubelet[1704]: I0510 00:45:48.128249 1704 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:45:48.128280 kubelet[1704]: I0510 00:45:48.128281 1704 state_mem.go:35] "Initializing new in-memory state store" May 10 00:45:48.376853 kubelet[1704]: E0510 00:45:48.376818 1704 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:48.459901 systemd[1]: Created slice kubepods.slice. May 10 00:45:48.463610 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:45:48.465952 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:45:48.472347 kubelet[1704]: I0510 00:45:48.472308 1704 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:45:48.471000 audit[1704]: AVC avc: denied { mac_admin } for pid=1704 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.471000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:48.471000 audit[1704]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00092b1d0 a1=c00099ec18 a2=c00092b1a0 a3=25 items=0 ppid=1 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.471000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:48.472739 kubelet[1704]: I0510 00:45:48.472368 1704 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:45:48.472739 kubelet[1704]: I0510 00:45:48.472455 1704 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:45:48.472739 kubelet[1704]: I0510 00:45:48.472561 1704 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:45:48.473850 kubelet[1704]: E0510 00:45:48.473833 1704 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 00:45:49.346266 kubelet[1704]: E0510 00:45:49.346201 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="3.2s" May 10 00:45:49.451157 kubelet[1704]: I0510 00:45:49.451111 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:49.451649 kubelet[1704]: E0510 00:45:49.451580 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:49.459842 kubelet[1704]: I0510 00:45:49.459763 1704 topology_manager.go:215] "Topology Admit Handler" podUID="0bbd6874f0dfae163d2efcc4d88d0ffd" podNamespace="kube-system" podName="kube-apiserver-localhost" May 10 00:45:49.460955 kubelet[1704]: I0510 00:45:49.460932 1704 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 10 00:45:49.461627 kubelet[1704]: I0510 00:45:49.461585 1704 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 10 00:45:49.495666 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 10 00:45:49.508125 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 10 00:45:49.512184 systemd[1]: Created slice kubepods-burstable-pod0bbd6874f0dfae163d2efcc4d88d0ffd.slice. May 10 00:45:49.561221 kubelet[1704]: I0510 00:45:49.561151 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:49.561221 kubelet[1704]: I0510 00:45:49.561202 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:49.561221 kubelet[1704]: I0510 00:45:49.561229 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:49.561423 kubelet[1704]: I0510 00:45:49.561297 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:49.561423 kubelet[1704]: I0510 00:45:49.561364 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:49.561423 kubelet[1704]: I0510 00:45:49.561386 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:49.561423 kubelet[1704]: I0510 00:45:49.561407 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:49.561423 kubelet[1704]: I0510 00:45:49.561422 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 10 00:45:49.561543 kubelet[1704]: I0510 00:45:49.561435 1704 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:49.646394 kubelet[1704]: W0510 00:45:49.646264 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:49.646394 kubelet[1704]: E0510 00:45:49.646327 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:49.807493 kubelet[1704]: E0510 00:45:49.807432 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:49.808172 env[1196]: time="2025-05-10T00:45:49.808122003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 10 00:45:49.811268 kubelet[1704]: E0510 00:45:49.811250 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:49.811733 env[1196]: time="2025-05-10T00:45:49.811685199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 10 00:45:49.813989 kubelet[1704]: E0510 00:45:49.813949 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:49.814451 env[1196]: time="2025-05-10T00:45:49.814417763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0bbd6874f0dfae163d2efcc4d88d0ffd,Namespace:kube-system,Attempt:0,}" May 10 00:45:50.360091 kubelet[1704]: W0510 00:45:50.360045 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:50.360091 kubelet[1704]: E0510 00:45:50.360092 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:50.410857 kubelet[1704]: W0510 00:45:50.410796 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:50.410857 kubelet[1704]: E0510 00:45:50.410859 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:50.659907 kubelet[1704]: W0510 00:45:50.659731 1704 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:50.659907 kubelet[1704]: E0510 00:45:50.659832 1704 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:52.547550 kubelet[1704]: E0510 00:45:52.547481 1704 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="6.4s" May 10 00:45:52.638271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2484357460.mount: Deactivated successfully. May 10 00:45:52.646261 env[1196]: time="2025-05-10T00:45:52.646189424Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.653565 kubelet[1704]: I0510 00:45:52.653499 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:52.654102 kubelet[1704]: E0510 00:45:52.654043 1704 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 10 00:45:52.655552 env[1196]: time="2025-05-10T00:45:52.655496478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.657042 env[1196]: time="2025-05-10T00:45:52.656972431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.659454 env[1196]: time="2025-05-10T00:45:52.659399370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.661809 env[1196]: time="2025-05-10T00:45:52.661769590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.663785 env[1196]: time="2025-05-10T00:45:52.663722683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.665517 env[1196]: time="2025-05-10T00:45:52.665486231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.668121 env[1196]: time="2025-05-10T00:45:52.668081376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.669339 env[1196]: time="2025-05-10T00:45:52.669294790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.671027 env[1196]: time="2025-05-10T00:45:52.670996670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.672610 env[1196]: time="2025-05-10T00:45:52.672573716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.674256 env[1196]: time="2025-05-10T00:45:52.674222693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:52.703002 env[1196]: time="2025-05-10T00:45:52.702928231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:52.703152 env[1196]: time="2025-05-10T00:45:52.702969430Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:52.703152 env[1196]: time="2025-05-10T00:45:52.702982325Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:52.703152 env[1196]: time="2025-05-10T00:45:52.703103579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ecc8c38b48b8d741c5a1f69608066f7b1b5271b06724c5b770b72a68794dc84 pid=1763 runtime=io.containerd.runc.v2 May 10 00:45:52.705714 env[1196]: time="2025-05-10T00:45:52.705525038Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:52.705714 env[1196]: time="2025-05-10T00:45:52.705561979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:52.705714 env[1196]: time="2025-05-10T00:45:52.705571689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:52.705843 env[1196]: time="2025-05-10T00:45:52.705744884Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93da3408e93e7cd4951df748b7ed1b93ca0c76ffb6b0d4de5dc4c3c79ddd73e4 pid=1770 runtime=io.containerd.runc.v2 May 10 00:45:52.708020 env[1196]: time="2025-05-10T00:45:52.707962920Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:52.708020 env[1196]: time="2025-05-10T00:45:52.707997887Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:52.708265 env[1196]: time="2025-05-10T00:45:52.708136574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:52.708472 env[1196]: time="2025-05-10T00:45:52.708349667Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1c8e786c34e591e6f6ff54eb87188c84b150324138498c2e5a775a0cfcbbb27 pid=1782 runtime=io.containerd.runc.v2 May 10 00:45:52.729597 systemd[1]: Started cri-containerd-8ecc8c38b48b8d741c5a1f69608066f7b1b5271b06724c5b770b72a68794dc84.scope. May 10 00:45:52.742947 systemd[1]: Started cri-containerd-93da3408e93e7cd4951df748b7ed1b93ca0c76ffb6b0d4de5dc4c3c79ddd73e4.scope. May 10 00:45:52.765286 kubelet[1704]: E0510 00:45:52.765208 1704 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.118:6443: connect: connection refused May 10 00:45:52.772241 systemd[1]: Started cri-containerd-f1c8e786c34e591e6f6ff54eb87188c84b150324138498c2e5a775a0cfcbbb27.scope. May 10 00:45:52.806905 kernel: kauditd_printk_skb: 215 callbacks suppressed May 10 00:45:52.807053 kernel: audit: type=1400 audit(1746837952.800:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811754 kernel: audit: type=1400 audit(1746837952.800:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.815987 kernel: audit: type=1400 audit(1746837952.800:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.816038 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.822088 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:52.822243 kernel: audit: type=1400 audit(1746837952.800:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.822275 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.822306 kernel: audit: backlog limit exceeded May 10 00:45:52.822334 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.822355 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:52.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit: BPF prog-id=55 op=LOAD May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633865373836633334653539316536663666663534656238373138 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633865373836633334653539316536663666663534656238373138 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.801000 audit: BPF prog-id=56 op=LOAD May 10 00:45:52.801000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000388350 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633865373836633334653539316536663666663534656238373138 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit: BPF prog-id=57 op=LOAD May 10 00:45:52.807000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.807000 audit: BPF prog-id=58 op=LOAD May 10 00:45:52.807000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000388398 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633865373836633334653539316536663666663534656238373138 May 10 00:45:52.811000 audit: BPF prog-id=58 op=UNLOAD May 10 00:45:52.811000 audit: BPF prog-id=56 op=UNLOAD May 10 00:45:52.811000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.811000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003887a8 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633865373836633334653539316536663666663534656238373138 May 10 00:45:52.816000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.816000 audit: BPF prog-id=60 op=LOAD May 10 00:45:52.816000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000223420 items=0 ppid=1770 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646133343038653933653763643439353164663734386237656431 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit: BPF prog-id=61 op=LOAD May 10 00:45:52.831000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000223468 items=0 ppid=1770 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646133343038653933653763643439353164663734386237656431 May 10 00:45:52.831000 audit: BPF prog-id=61 op=UNLOAD May 10 00:45:52.831000 audit: BPF prog-id=60 op=UNLOAD May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.831000 audit: BPF prog-id=62 op=LOAD May 10 00:45:52.831000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000223878 items=0 ppid=1770 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646133343038653933653763643439353164663734386237656431 May 10 00:45:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit: BPF prog-id=63 op=LOAD May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1763 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865636338633338623438623864373431633561316636393630383036 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1763 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865636338633338623438623864373431633561316636393630383036 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.845000 audit: BPF prog-id=64 op=LOAD May 10 00:45:52.845000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039ab70 items=0 ppid=1763 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865636338633338623438623864373431633561316636393630383036 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit: BPF prog-id=65 op=LOAD May 10 00:45:52.846000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039abb8 items=0 ppid=1763 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865636338633338623438623864373431633561316636393630383036 May 10 00:45:52.846000 audit: BPF prog-id=65 op=UNLOAD May 10 00:45:52.846000 audit: BPF prog-id=64 op=UNLOAD May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.846000 audit: BPF prog-id=66 op=LOAD May 10 00:45:52.846000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039afc8 items=0 ppid=1763 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865636338633338623438623864373431633561316636393630383036 May 10 00:45:52.872261 env[1196]: time="2025-05-10T00:45:52.871840831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"93da3408e93e7cd4951df748b7ed1b93ca0c76ffb6b0d4de5dc4c3c79ddd73e4\"" May 10 00:45:52.873462 kubelet[1704]: E0510 00:45:52.873396 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:52.877006 env[1196]: time="2025-05-10T00:45:52.876962898Z" level=info msg="CreateContainer within sandbox \"93da3408e93e7cd4951df748b7ed1b93ca0c76ffb6b0d4de5dc4c3c79ddd73e4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:45:52.895756 env[1196]: time="2025-05-10T00:45:52.893167361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0bbd6874f0dfae163d2efcc4d88d0ffd,Namespace:kube-system,Attempt:0,} returns sandbox id \"f1c8e786c34e591e6f6ff54eb87188c84b150324138498c2e5a775a0cfcbbb27\"" May 10 00:45:52.895939 kubelet[1704]: E0510 00:45:52.895042 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:52.901579 env[1196]: time="2025-05-10T00:45:52.901523097Z" level=info msg="CreateContainer within sandbox \"f1c8e786c34e591e6f6ff54eb87188c84b150324138498c2e5a775a0cfcbbb27\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:45:52.902792 env[1196]: time="2025-05-10T00:45:52.902748584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"8ecc8c38b48b8d741c5a1f69608066f7b1b5271b06724c5b770b72a68794dc84\"" May 10 00:45:52.903738 kubelet[1704]: E0510 00:45:52.903319 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:52.905360 env[1196]: time="2025-05-10T00:45:52.905337978Z" level=info msg="CreateContainer within sandbox \"8ecc8c38b48b8d741c5a1f69608066f7b1b5271b06724c5b770b72a68794dc84\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:45:53.023228 env[1196]: time="2025-05-10T00:45:53.023140121Z" level=info msg="CreateContainer within sandbox \"93da3408e93e7cd4951df748b7ed1b93ca0c76ffb6b0d4de5dc4c3c79ddd73e4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ada6aaa489a5ddcff64c1cb47ee7205fc27b53167085eec249091de4cdf4246d\"" May 10 00:45:53.024017 env[1196]: time="2025-05-10T00:45:53.023984409Z" level=info msg="StartContainer for \"ada6aaa489a5ddcff64c1cb47ee7205fc27b53167085eec249091de4cdf4246d\"" May 10 00:45:53.041151 systemd[1]: Started cri-containerd-ada6aaa489a5ddcff64c1cb47ee7205fc27b53167085eec249091de4cdf4246d.scope. May 10 00:45:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.054000 audit: BPF prog-id=67 op=LOAD May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1770 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613661616134383961356464636666363463316362343765653732 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1770 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613661616134383961356464636666363463316362343765653732 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit: BPF prog-id=68 op=LOAD May 10 00:45:53.055000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0000a5df0 items=0 ppid=1770 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613661616134383961356464636666363463316362343765653732 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit: BPF prog-id=69 op=LOAD May 10 00:45:53.055000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000a5e38 items=0 ppid=1770 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613661616134383961356464636666363463316362343765653732 May 10 00:45:53.055000 audit: BPF prog-id=69 op=UNLOAD May 10 00:45:53.055000 audit: BPF prog-id=68 op=UNLOAD May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.055000 audit: BPF prog-id=70 op=LOAD May 10 00:45:53.055000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00041a248 items=0 ppid=1770 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613661616134383961356464636666363463316362343765653732 May 10 00:45:53.100945 env[1196]: time="2025-05-10T00:45:53.100844429Z" level=info msg="CreateContainer within sandbox \"f1c8e786c34e591e6f6ff54eb87188c84b150324138498c2e5a775a0cfcbbb27\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cb0ecf4b2d93eb8cac51df1c28a5495ca82abac0367264971b3075d42704c645\"" May 10 00:45:53.101631 env[1196]: time="2025-05-10T00:45:53.101575761Z" level=info msg="StartContainer for \"cb0ecf4b2d93eb8cac51df1c28a5495ca82abac0367264971b3075d42704c645\"" May 10 00:45:53.104074 env[1196]: time="2025-05-10T00:45:53.104029875Z" level=info msg="StartContainer for \"ada6aaa489a5ddcff64c1cb47ee7205fc27b53167085eec249091de4cdf4246d\" returns successfully" May 10 00:45:53.109460 env[1196]: time="2025-05-10T00:45:53.109403365Z" level=info msg="CreateContainer within sandbox \"8ecc8c38b48b8d741c5a1f69608066f7b1b5271b06724c5b770b72a68794dc84\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"1d1fa8369ab89f503385a4e9377e1ce4e0398a60955bf5c72743eba1eb23f5ae\"" May 10 00:45:53.110119 env[1196]: time="2025-05-10T00:45:53.110078639Z" level=info msg="StartContainer for \"1d1fa8369ab89f503385a4e9377e1ce4e0398a60955bf5c72743eba1eb23f5ae\"" May 10 00:45:53.164564 systemd[1]: Started cri-containerd-cb0ecf4b2d93eb8cac51df1c28a5495ca82abac0367264971b3075d42704c645.scope. May 10 00:45:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.180000 audit: BPF prog-id=71 op=LOAD May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1782 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306563663462326439336562386361633531646631633238613534 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1782 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306563663462326439336562386361633531646631633238613534 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit: BPF prog-id=72 op=LOAD May 10 00:45:53.181000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000304d80 items=0 ppid=1782 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306563663462326439336562386361633531646631633238613534 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit: BPF prog-id=73 op=LOAD May 10 00:45:53.181000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000304dc8 items=0 ppid=1782 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306563663462326439336562386361633531646631633238613534 May 10 00:45:53.181000 audit: BPF prog-id=73 op=UNLOAD May 10 00:45:53.181000 audit: BPF prog-id=72 op=UNLOAD May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.181000 audit: BPF prog-id=74 op=LOAD May 10 00:45:53.181000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003051d8 items=0 ppid=1782 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306563663462326439336562386361633531646631633238613534 May 10 00:45:53.196641 systemd[1]: Started cri-containerd-1d1fa8369ab89f503385a4e9377e1ce4e0398a60955bf5c72743eba1eb23f5ae.scope. May 10 00:45:53.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.227000 audit: BPF prog-id=75 op=LOAD May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1763 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316661383336396162383966353033333835613465393337376531 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1763 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316661383336396162383966353033333835613465393337376531 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit: BPF prog-id=76 op=LOAD May 10 00:45:53.228000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000096540 items=0 ppid=1763 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316661383336396162383966353033333835613465393337376531 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit: BPF prog-id=77 op=LOAD May 10 00:45:53.228000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000096588 items=0 ppid=1763 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316661383336396162383966353033333835613465393337376531 May 10 00:45:53.228000 audit: BPF prog-id=77 op=UNLOAD May 10 00:45:53.228000 audit: BPF prog-id=76 op=UNLOAD May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.228000 audit: BPF prog-id=78 op=LOAD May 10 00:45:53.228000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000096998 items=0 ppid=1763 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316661383336396162383966353033333835613465393337376531 May 10 00:45:53.231160 env[1196]: time="2025-05-10T00:45:53.229632716Z" level=info msg="StartContainer for \"cb0ecf4b2d93eb8cac51df1c28a5495ca82abac0367264971b3075d42704c645\" returns successfully" May 10 00:45:53.270488 env[1196]: time="2025-05-10T00:45:53.270407540Z" level=info msg="StartContainer for \"1d1fa8369ab89f503385a4e9377e1ce4e0398a60955bf5c72743eba1eb23f5ae\" returns successfully" May 10 00:45:53.374167 kubelet[1704]: E0510 00:45:53.374049 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:53.377816 kubelet[1704]: E0510 00:45:53.377794 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:53.379784 kubelet[1704]: E0510 00:45:53.379764 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:53.939000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:53.939000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000a0e300 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:53.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:53.939000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:53.939000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000ba280 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:53.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:54.382651 kubelet[1704]: E0510 00:45:54.382596 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:54.877000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.877000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00546eba0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.877000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:54.877000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.877000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0050ce090 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.877000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:54.878000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.878000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0050ce0c0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:54.892000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.892000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0068a5d20 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:54.892000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.892000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=87 a1=c0050ac620 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:54.892000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:54.892000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=86 a1=c005318690 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:45:54.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:55.226757 kubelet[1704]: E0510 00:45:55.226555 1704 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.183e03db679a5247 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:45:46.337219143 +0000 UTC m=+0.450000950,LastTimestamp:2025-05-10 00:45:46.337219143 +0000 UTC m=+0.450000950,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:45:55.560275 kubelet[1704]: E0510 00:45:55.560143 1704 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 10 00:45:55.937766 kubelet[1704]: E0510 00:45:55.937694 1704 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 10 00:45:55.951020 kubelet[1704]: E0510 00:45:55.950985 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:56.378007 kubelet[1704]: E0510 00:45:56.377964 1704 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 10 00:45:56.570982 kubelet[1704]: E0510 00:45:56.570938 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:57.321923 kubelet[1704]: I0510 00:45:57.321864 1704 apiserver.go:52] "Watching apiserver" May 10 00:45:57.342220 kubelet[1704]: I0510 00:45:57.342165 1704 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:45:57.843242 kubelet[1704]: E0510 00:45:57.843192 1704 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 10 00:45:58.474352 kubelet[1704]: E0510 00:45:58.474308 1704 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 00:45:58.963767 kubelet[1704]: E0510 00:45:58.963682 1704 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 10 00:45:58.971000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.974475 kernel: kauditd_printk_skb: 376 callbacks suppressed May 10 00:45:58.974626 kernel: audit: type=1400 audit(1746837958.971:545): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.983866 kernel: audit: type=1300 audit(1746837958.971:545): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dfe640 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.971000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dfe640 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:58.989486 kernel: audit: type=1327 audit(1746837958.971:545): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:58.989532 kernel: audit: type=1400 audit(1746837958.975:546): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.975000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.993557 kernel: audit: type=1300 audit(1746837958.975:546): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00113dd20 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.975000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00113dd20 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:59.000167 kernel: audit: type=1327 audit(1746837958.975:546): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:58.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:58.978000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.009531 kernel: audit: type=1400 audit(1746837958.978:547): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.009617 kernel: audit: type=1300 audit(1746837958.978:547): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fe2820 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.978000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fe2820 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.978000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.034315 kernel: audit: type=1327 audit(1746837958.978:547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.034410 kernel: audit: type=1400 audit(1746837958.979:548): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.979000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:58.979000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00113dec0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:45:58.979000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.056027 kubelet[1704]: I0510 00:45:59.055963 1704 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:45:59.114348 kubelet[1704]: I0510 00:45:59.114316 1704 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 10 00:45:59.652696 kubelet[1704]: E0510 00:45:59.652645 1704 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:59.736780 systemd[1]: Reloading. May 10 00:45:59.821498 /usr/lib/systemd/system-generators/torcx-generator[2012]: time="2025-05-10T00:45:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:59.821533 /usr/lib/systemd/system-generators/torcx-generator[2012]: time="2025-05-10T00:45:59Z" level=info msg="torcx already run" May 10 00:45:59.889605 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:59.889624 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:59.909760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.986000 audit: BPF prog-id=79 op=LOAD May 10 00:45:59.986000 audit: BPF prog-id=40 op=UNLOAD May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit: BPF prog-id=80 op=LOAD May 10 00:45:59.987000 audit: BPF prog-id=41 op=UNLOAD May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit: BPF prog-id=81 op=LOAD May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.987000 audit: BPF prog-id=82 op=LOAD May 10 00:45:59.987000 audit: BPF prog-id=42 op=UNLOAD May 10 00:45:59.987000 audit: BPF prog-id=43 op=UNLOAD May 10 00:45:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit: BPF prog-id=83 op=LOAD May 10 00:45:59.988000 audit: BPF prog-id=44 op=UNLOAD May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.988000 audit: BPF prog-id=84 op=LOAD May 10 00:45:59.988000 audit: BPF prog-id=71 op=UNLOAD May 10 00:45:59.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.989000 audit: BPF prog-id=85 op=LOAD May 10 00:45:59.989000 audit: BPF prog-id=45 op=UNLOAD May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit: BPF prog-id=86 op=LOAD May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit: BPF prog-id=87 op=LOAD May 10 00:45:59.990000 audit: BPF prog-id=46 op=UNLOAD May 10 00:45:59.990000 audit: BPF prog-id=47 op=UNLOAD May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit: BPF prog-id=88 op=LOAD May 10 00:45:59.991000 audit: BPF prog-id=63 op=UNLOAD May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.991000 audit: BPF prog-id=89 op=LOAD May 10 00:45:59.991000 audit: BPF prog-id=67 op=UNLOAD May 10 00:45:59.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.993000 audit: BPF prog-id=90 op=LOAD May 10 00:45:59.993000 audit: BPF prog-id=55 op=UNLOAD May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit: BPF prog-id=91 op=LOAD May 10 00:45:59.996000 audit: BPF prog-id=48 op=UNLOAD May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit: BPF prog-id=92 op=LOAD May 10 00:45:59.997000 audit: BPF prog-id=75 op=UNLOAD May 10 00:45:59.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit: BPF prog-id=93 op=LOAD May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit: BPF prog-id=94 op=LOAD May 10 00:45:59.998000 audit: BPF prog-id=49 op=UNLOAD May 10 00:45:59.998000 audit: BPF prog-id=50 op=UNLOAD May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit: BPF prog-id=95 op=LOAD May 10 00:45:59.999000 audit: BPF prog-id=51 op=UNLOAD May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit: BPF prog-id=96 op=LOAD May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.999000 audit: BPF prog-id=97 op=LOAD May 10 00:45:59.999000 audit: BPF prog-id=52 op=UNLOAD May 10 00:45:59.999000 audit: BPF prog-id=53 op=UNLOAD May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit: BPF prog-id=98 op=LOAD May 10 00:46:00.000000 audit: BPF prog-id=57 op=UNLOAD May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.001000 audit: BPF prog-id=99 op=LOAD May 10 00:46:00.001000 audit: BPF prog-id=54 op=UNLOAD May 10 00:46:00.013487 systemd[1]: Stopping kubelet.service... May 10 00:46:00.035142 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:46:00.035376 systemd[1]: Stopped kubelet.service. May 10 00:46:00.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.037438 systemd[1]: Starting kubelet.service... May 10 00:46:00.149511 systemd[1]: Started kubelet.service. May 10 00:46:00.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.206370 kubelet[2056]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:00.206370 kubelet[2056]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:46:00.206370 kubelet[2056]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:00.207051 kubelet[2056]: I0510 00:46:00.206459 2056 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:46:00.213409 kubelet[2056]: I0510 00:46:00.213367 2056 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:46:00.213409 kubelet[2056]: I0510 00:46:00.213402 2056 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:46:00.213661 kubelet[2056]: I0510 00:46:00.213650 2056 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:46:00.215115 kubelet[2056]: I0510 00:46:00.215070 2056 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:46:00.216552 kubelet[2056]: I0510 00:46:00.216520 2056 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:46:00.230305 kubelet[2056]: I0510 00:46:00.230268 2056 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:46:00.230510 kubelet[2056]: I0510 00:46:00.230476 2056 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:46:00.230728 kubelet[2056]: I0510 00:46:00.230512 2056 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:46:00.230728 kubelet[2056]: I0510 00:46:00.230728 2056 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:46:00.230897 kubelet[2056]: I0510 00:46:00.230739 2056 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:46:00.230897 kubelet[2056]: I0510 00:46:00.230776 2056 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:00.230897 kubelet[2056]: I0510 00:46:00.230852 2056 kubelet.go:400] "Attempting to sync node with API server" May 10 00:46:00.230897 kubelet[2056]: I0510 00:46:00.230865 2056 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:46:00.230897 kubelet[2056]: I0510 00:46:00.230896 2056 kubelet.go:312] "Adding apiserver pod source" May 10 00:46:00.231000 kubelet[2056]: I0510 00:46:00.230915 2056 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:46:00.233587 kubelet[2056]: I0510 00:46:00.233438 2056 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:46:00.233678 kubelet[2056]: I0510 00:46:00.233645 2056 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:46:00.234316 kubelet[2056]: I0510 00:46:00.234275 2056 server.go:1264] "Started kubelet" May 10 00:46:00.235000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.235000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:00.235000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c7b0e0 a1=c0006b0f78 a2=c000c7b0b0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:00.235000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.235000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:00.235000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c764a0 a1=c0006b0f90 a2=c000c7b170 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:00.238074 kubelet[2056]: I0510 00:46:00.236782 2056 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:46:00.238074 kubelet[2056]: I0510 00:46:00.236835 2056 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:46:00.238074 kubelet[2056]: I0510 00:46:00.236870 2056 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:46:00.245530 kubelet[2056]: I0510 00:46:00.245501 2056 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:46:00.247530 kubelet[2056]: I0510 00:46:00.247456 2056 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:46:00.250256 kubelet[2056]: I0510 00:46:00.246715 2056 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:46:00.250488 kubelet[2056]: I0510 00:46:00.250449 2056 reconciler.go:26] "Reconciler: start to sync state" May 10 00:46:00.251247 kubelet[2056]: I0510 00:46:00.250491 2056 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:46:00.252583 kubelet[2056]: I0510 00:46:00.252515 2056 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:46:00.253438 kubelet[2056]: I0510 00:46:00.253412 2056 server.go:455] "Adding debug handlers to kubelet server" May 10 00:46:00.253785 kubelet[2056]: I0510 00:46:00.253751 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:46:00.257532 kubelet[2056]: I0510 00:46:00.257502 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:46:00.257694 kubelet[2056]: I0510 00:46:00.257677 2056 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:46:00.257830 kubelet[2056]: I0510 00:46:00.257814 2056 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:46:00.259633 kubelet[2056]: E0510 00:46:00.257970 2056 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:46:00.263998 kubelet[2056]: I0510 00:46:00.263975 2056 factory.go:221] Registration of the systemd container factory successfully May 10 00:46:00.264203 kubelet[2056]: I0510 00:46:00.264182 2056 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:46:00.264435 kubelet[2056]: E0510 00:46:00.264294 2056 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:46:00.265887 kubelet[2056]: I0510 00:46:00.265869 2056 factory.go:221] Registration of the containerd container factory successfully May 10 00:46:00.296437 kubelet[2056]: I0510 00:46:00.296413 2056 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:46:00.296437 kubelet[2056]: I0510 00:46:00.296429 2056 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:46:00.296437 kubelet[2056]: I0510 00:46:00.296447 2056 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:00.296626 kubelet[2056]: I0510 00:46:00.296574 2056 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:46:00.296626 kubelet[2056]: I0510 00:46:00.296583 2056 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:46:00.296626 kubelet[2056]: I0510 00:46:00.296599 2056 policy_none.go:49] "None policy: Start" May 10 00:46:00.297196 kubelet[2056]: I0510 00:46:00.297183 2056 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:46:00.297263 kubelet[2056]: I0510 00:46:00.297199 2056 state_mem.go:35] "Initializing new in-memory state store" May 10 00:46:00.297326 kubelet[2056]: I0510 00:46:00.297312 2056 state_mem.go:75] "Updated machine memory state" May 10 00:46:00.301786 kubelet[2056]: I0510 00:46:00.301765 2056 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:46:00.300000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:00.300000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:00.300000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f6e10 a1=c001128108 a2=c0007f6de0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.300000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:00.302118 kubelet[2056]: I0510 00:46:00.301857 2056 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:46:00.302118 kubelet[2056]: I0510 00:46:00.302069 2056 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:46:00.302645 kubelet[2056]: I0510 00:46:00.302612 2056 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:46:00.349809 kubelet[2056]: I0510 00:46:00.349772 2056 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 10 00:46:00.360085 kubelet[2056]: I0510 00:46:00.360008 2056 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 10 00:46:00.360376 kubelet[2056]: I0510 00:46:00.360356 2056 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 10 00:46:00.360571 kubelet[2056]: I0510 00:46:00.360550 2056 topology_manager.go:215] "Topology Admit Handler" podUID="0bbd6874f0dfae163d2efcc4d88d0ffd" podNamespace="kube-system" podName="kube-apiserver-localhost" May 10 00:46:00.451736 kubelet[2056]: I0510 00:46:00.451593 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:46:00.451736 kubelet[2056]: I0510 00:46:00.451660 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:46:00.451736 kubelet[2056]: I0510 00:46:00.451690 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:46:00.451736 kubelet[2056]: I0510 00:46:00.451745 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:46:00.451736 kubelet[2056]: I0510 00:46:00.451768 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:46:00.452216 kubelet[2056]: I0510 00:46:00.451787 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:46:00.452216 kubelet[2056]: I0510 00:46:00.451806 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:46:00.452216 kubelet[2056]: I0510 00:46:00.451825 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 10 00:46:00.452216 kubelet[2056]: I0510 00:46:00.451863 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0bbd6874f0dfae163d2efcc4d88d0ffd-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0bbd6874f0dfae163d2efcc4d88d0ffd\") " pod="kube-system/kube-apiserver-localhost" May 10 00:46:00.538808 kubelet[2056]: E0510 00:46:00.538673 2056 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 10 00:46:00.545085 kubelet[2056]: I0510 00:46:00.544929 2056 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 10 00:46:00.545085 kubelet[2056]: I0510 00:46:00.545058 2056 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 10 00:46:00.838614 kubelet[2056]: E0510 00:46:00.838557 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:00.838614 kubelet[2056]: E0510 00:46:00.838618 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:00.840131 kubelet[2056]: E0510 00:46:00.840089 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.231996 kubelet[2056]: I0510 00:46:01.231860 2056 apiserver.go:52] "Watching apiserver" May 10 00:46:01.248431 kubelet[2056]: I0510 00:46:01.248369 2056 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:46:01.274720 kubelet[2056]: E0510 00:46:01.274681 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.274855 kubelet[2056]: E0510 00:46:01.274842 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.274881 kubelet[2056]: E0510 00:46:01.274862 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:02.256424 kubelet[2056]: I0510 00:46:02.256342 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.256309472 podStartE2EDuration="2.256309472s" podCreationTimestamp="2025-05-10 00:46:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:01.699859112 +0000 UTC m=+1.545598389" watchObservedRunningTime="2025-05-10 00:46:02.256309472 +0000 UTC m=+2.102048749" May 10 00:46:02.276878 kubelet[2056]: E0510 00:46:02.276826 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:02.618379 kubelet[2056]: I0510 00:46:02.618292 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.618243863 podStartE2EDuration="2.618243863s" podCreationTimestamp="2025-05-10 00:46:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:02.258474522 +0000 UTC m=+2.104213799" watchObservedRunningTime="2025-05-10 00:46:02.618243863 +0000 UTC m=+2.463983140" May 10 00:46:02.672051 kubelet[2056]: E0510 00:46:02.672005 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:03.278340 kubelet[2056]: E0510 00:46:03.278293 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:03.458837 kubelet[2056]: E0510 00:46:03.458802 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:03.776816 kubelet[2056]: I0510 00:46:03.647751 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=4.647728811 podStartE2EDuration="4.647728811s" podCreationTimestamp="2025-05-10 00:45:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:02.618751163 +0000 UTC m=+2.464490460" watchObservedRunningTime="2025-05-10 00:46:03.647728811 +0000 UTC m=+3.493468088" May 10 00:46:04.280251 kubelet[2056]: E0510 00:46:04.280218 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:09.029067 sudo[1331]: pam_unix(sudo:session): session closed for user root May 10 00:46:09.028000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:09.030353 kernel: kauditd_printk_skb: 260 callbacks suppressed May 10 00:46:09.030608 kernel: audit: type=1106 audit(1746837969.028:798): pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:09.030973 sshd[1328]: pam_unix(sshd:session): session closed for user core May 10 00:46:09.033157 systemd[1]: sshd@6-10.0.0.118:22-10.0.0.1:42406.service: Deactivated successfully. May 10 00:46:09.033833 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:46:09.033982 systemd[1]: session-7.scope: Consumed 4.843s CPU time. May 10 00:46:09.034406 systemd-logind[1181]: Session 7 logged out. Waiting for processes to exit. May 10 00:46:09.035145 systemd-logind[1181]: Removed session 7. May 10 00:46:09.028000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:09.061405 kernel: audit: type=1104 audit(1746837969.028:799): pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:09.061467 kernel: audit: type=1106 audit(1746837969.030:800): pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:09.030000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:09.030000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:09.069974 kernel: audit: type=1104 audit(1746837969.030:801): pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:09.070022 kernel: audit: type=1131 audit(1746837969.030:802): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:42406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:09.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:42406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.984000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:46:10.984000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010276c0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:10.997082 kernel: audit: type=1400 audit(1746837970.984:803): avc: denied { watch } for pid=1891 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:46:10.997156 kernel: audit: type=1300 audit(1746837970.984:803): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010276c0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:10.997187 kernel: audit: type=1327 audit(1746837970.984:803): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:10.984000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:11.520129 kubelet[2056]: I0510 00:46:11.520085 2056 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:46:11.520659 env[1196]: time="2025-05-10T00:46:11.520541141Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:46:11.520916 kubelet[2056]: I0510 00:46:11.520725 2056 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:46:11.980216 kubelet[2056]: E0510 00:46:11.980164 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:12.237061 kubelet[2056]: I0510 00:46:12.236926 2056 topology_manager.go:215] "Topology Admit Handler" podUID="7b7171d4-c34d-4e1c-93c1-ac5c768f6c88" podNamespace="kube-system" podName="kube-proxy-tzfjc" May 10 00:46:12.244987 systemd[1]: Created slice kubepods-besteffort-pod7b7171d4_c34d_4e1c_93c1_ac5c768f6c88.slice. May 10 00:46:12.328957 kubelet[2056]: I0510 00:46:12.328900 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-kube-proxy\") pod \"kube-proxy-tzfjc\" (UID: \"7b7171d4-c34d-4e1c-93c1-ac5c768f6c88\") " pod="kube-system/kube-proxy-tzfjc" May 10 00:46:12.328957 kubelet[2056]: I0510 00:46:12.328949 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-xtables-lock\") pod \"kube-proxy-tzfjc\" (UID: \"7b7171d4-c34d-4e1c-93c1-ac5c768f6c88\") " pod="kube-system/kube-proxy-tzfjc" May 10 00:46:12.329210 kubelet[2056]: I0510 00:46:12.328977 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5fk5s\" (UniqueName: \"kubernetes.io/projected/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-kube-api-access-5fk5s\") pod \"kube-proxy-tzfjc\" (UID: \"7b7171d4-c34d-4e1c-93c1-ac5c768f6c88\") " pod="kube-system/kube-proxy-tzfjc" May 10 00:46:12.329210 kubelet[2056]: I0510 00:46:12.329009 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-lib-modules\") pod \"kube-proxy-tzfjc\" (UID: \"7b7171d4-c34d-4e1c-93c1-ac5c768f6c88\") " pod="kube-system/kube-proxy-tzfjc" May 10 00:46:12.471342 kubelet[2056]: E0510 00:46:12.471296 2056 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 10 00:46:12.471342 kubelet[2056]: E0510 00:46:12.471340 2056 projected.go:200] Error preparing data for projected volume kube-api-access-5fk5s for pod kube-system/kube-proxy-tzfjc: configmap "kube-root-ca.crt" not found May 10 00:46:12.471564 kubelet[2056]: E0510 00:46:12.471456 2056 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-kube-api-access-5fk5s podName:7b7171d4-c34d-4e1c-93c1-ac5c768f6c88 nodeName:}" failed. No retries permitted until 2025-05-10 00:46:12.971419678 +0000 UTC m=+12.817158955 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-5fk5s" (UniqueName: "kubernetes.io/projected/7b7171d4-c34d-4e1c-93c1-ac5c768f6c88-kube-api-access-5fk5s") pod "kube-proxy-tzfjc" (UID: "7b7171d4-c34d-4e1c-93c1-ac5c768f6c88") : configmap "kube-root-ca.crt" not found May 10 00:46:12.675961 kubelet[2056]: E0510 00:46:12.675913 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:12.914827 kubelet[2056]: I0510 00:46:12.914780 2056 topology_manager.go:215] "Topology Admit Handler" podUID="f4f57f5e-e604-469b-9d21-e9d01394ad08" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-k69l9" May 10 00:46:12.921051 systemd[1]: Created slice kubepods-besteffort-podf4f57f5e_e604_469b_9d21_e9d01394ad08.slice. May 10 00:46:13.033524 kubelet[2056]: I0510 00:46:13.033341 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-58skb\" (UniqueName: \"kubernetes.io/projected/f4f57f5e-e604-469b-9d21-e9d01394ad08-kube-api-access-58skb\") pod \"tigera-operator-797db67f8-k69l9\" (UID: \"f4f57f5e-e604-469b-9d21-e9d01394ad08\") " pod="tigera-operator/tigera-operator-797db67f8-k69l9" May 10 00:46:13.033524 kubelet[2056]: I0510 00:46:13.033405 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f4f57f5e-e604-469b-9d21-e9d01394ad08-var-lib-calico\") pod \"tigera-operator-797db67f8-k69l9\" (UID: \"f4f57f5e-e604-469b-9d21-e9d01394ad08\") " pod="tigera-operator/tigera-operator-797db67f8-k69l9" May 10 00:46:13.157316 kubelet[2056]: E0510 00:46:13.157271 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:13.157913 env[1196]: time="2025-05-10T00:46:13.157873767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tzfjc,Uid:7b7171d4-c34d-4e1c-93c1-ac5c768f6c88,Namespace:kube-system,Attempt:0,}" May 10 00:46:13.224448 env[1196]: time="2025-05-10T00:46:13.224402347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-k69l9,Uid:f4f57f5e-e604-469b-9d21-e9d01394ad08,Namespace:tigera-operator,Attempt:0,}" May 10 00:46:13.358230 env[1196]: time="2025-05-10T00:46:13.358166272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:13.358230 env[1196]: time="2025-05-10T00:46:13.358203202Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:13.358465 env[1196]: time="2025-05-10T00:46:13.358212500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:13.358658 env[1196]: time="2025-05-10T00:46:13.358632739Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b97148678feb29bc57afe4fe03e9474028d8e6ec5c26b0248e730a30189f0108 pid=2160 runtime=io.containerd.runc.v2 May 10 00:46:13.365654 env[1196]: time="2025-05-10T00:46:13.365557208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:13.365839 env[1196]: time="2025-05-10T00:46:13.365660124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:13.365839 env[1196]: time="2025-05-10T00:46:13.365691524Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:13.365996 env[1196]: time="2025-05-10T00:46:13.365941028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0904bffe4e3cb0078bde7a32c8f2cccf9e2f034b18d928a7bacbf122af2a4560 pid=2177 runtime=io.containerd.runc.v2 May 10 00:46:13.374473 systemd[1]: Started cri-containerd-b97148678feb29bc57afe4fe03e9474028d8e6ec5c26b0248e730a30189f0108.scope. May 10 00:46:13.380882 systemd[1]: Started cri-containerd-0904bffe4e3cb0078bde7a32c8f2cccf9e2f034b18d928a7bacbf122af2a4560.scope. May 10 00:46:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409473 kernel: audit: type=1400 audit(1746837973.388:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409608 kernel: audit: type=1400 audit(1746837973.388:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit: BPF prog-id=100 op=LOAD May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit: BPF prog-id=101 op=LOAD May 10 00:46:13.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.388000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c0003c87f0 items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.405000 audit: BPF prog-id=102 op=LOAD May 10 00:46:13.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000119770 a2=78 a3=c0003c8838 items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2190]: AVC avc: denied { bpf } for pid=2190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2190]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2177 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303462666665346533636230303738626465376133326338663263 May 10 00:46:13.405000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.405000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=1 items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.409000 audit: BPF prog-id=103 op=UNLOAD May 10 00:46:13.409000 audit: BPF prog-id=101 op=UNLOAD May 10 00:46:13.408000 audit[2190]: AVC avc: denied { bpf } for pid=2190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.408000 audit: BPF prog-id=106 op=LOAD May 10 00:46:13.409000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.408000 audit[2190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003813a8 items=0 ppid=2177 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303462666665346533636230303738626465376133326338663263 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.409000 audit: BPF prog-id=107 op=LOAD May 10 00:46:13.409000 audit[2175]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c0003c8c48 items=0 ppid=2160 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239373134383637386665623239626335376166653466653033653934 May 10 00:46:13.421349 env[1196]: time="2025-05-10T00:46:13.421303694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tzfjc,Uid:7b7171d4-c34d-4e1c-93c1-ac5c768f6c88,Namespace:kube-system,Attempt:0,} returns sandbox id \"b97148678feb29bc57afe4fe03e9474028d8e6ec5c26b0248e730a30189f0108\"" May 10 00:46:13.422473 kubelet[2056]: E0510 00:46:13.422168 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:13.424312 env[1196]: time="2025-05-10T00:46:13.424271248Z" level=info msg="CreateContainer within sandbox \"b97148678feb29bc57afe4fe03e9474028d8e6ec5c26b0248e730a30189f0108\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:46:13.434613 env[1196]: time="2025-05-10T00:46:13.434580954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-k69l9,Uid:f4f57f5e-e604-469b-9d21-e9d01394ad08,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0904bffe4e3cb0078bde7a32c8f2cccf9e2f034b18d928a7bacbf122af2a4560\"" May 10 00:46:13.436307 env[1196]: time="2025-05-10T00:46:13.436263804Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:46:14.091717 env[1196]: time="2025-05-10T00:46:14.091642681Z" level=info msg="CreateContainer within sandbox \"b97148678feb29bc57afe4fe03e9474028d8e6ec5c26b0248e730a30189f0108\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f02844620a0bd81a0fe94732e3eff489a8b688dc4221de9d81ac16c802a98a15\"" May 10 00:46:14.092438 env[1196]: time="2025-05-10T00:46:14.092411331Z" level=info msg="StartContainer for \"f02844620a0bd81a0fe94732e3eff489a8b688dc4221de9d81ac16c802a98a15\"" May 10 00:46:14.108664 systemd[1]: Started cri-containerd-f02844620a0bd81a0fe94732e3eff489a8b688dc4221de9d81ac16c802a98a15.scope. May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.123491 kernel: kauditd_printk_skb: 184 callbacks suppressed May 10 00:46:14.123548 kernel: audit: type=1400 audit(1746837974.121:836): avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f16a85b07b8 items=0 ppid=2160 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.132872 kernel: audit: type=1300 audit(1746837974.121:836): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f16a85b07b8 items=0 ppid=2160 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.132915 kernel: audit: type=1327 audit(1746837974.121:836): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323834343632306130626438316130666539343733326533656666 May 10 00:46:14.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323834343632306130626438316130666539343733326533656666 May 10 00:46:14.137802 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.144734 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.144779 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.151865 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.151921 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.154895 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.121000 audit: BPF prog-id=108 op=LOAD May 10 00:46:14.121000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000316db8 items=0 ppid=2160 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323834343632306130626438316130666539343733326533656666 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.126000 audit: BPF prog-id=109 op=LOAD May 10 00:46:14.126000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000316e08 items=0 ppid=2160 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323834343632306130626438316130666539343733326533656666 May 10 00:46:14.137000 audit: BPF prog-id=109 op=UNLOAD May 10 00:46:14.137000 audit: BPF prog-id=108 op=UNLOAD May 10 00:46:14.137000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.163732 kernel: audit: type=1400 audit(1746837974.121:837): avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.137000 audit: BPF prog-id=110 op=LOAD May 10 00:46:14.137000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000316e98 items=0 ppid=2160 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323834343632306130626438316130666539343733326533656666 May 10 00:46:14.171910 env[1196]: time="2025-05-10T00:46:14.171850613Z" level=info msg="StartContainer for \"f02844620a0bd81a0fe94732e3eff489a8b688dc4221de9d81ac16c802a98a15\" returns successfully" May 10 00:46:14.227000 audit[2296]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.227000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb92c8650 a2=0 a3=7ffdb92c863c items=0 ppid=2252 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:14.227000 audit[2297]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.227000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda83d7aa0 a2=0 a3=7ffda83d7a8c items=0 ppid=2252 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:14.229000 audit[2298]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.229000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd51095b30 a2=0 a3=7ffd51095b1c items=0 ppid=2252 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:14.230000 audit[2299]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.230000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff62187c80 a2=0 a3=7fff62187c6c items=0 ppid=2252 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:14.230000 audit[2300]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.230000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff46ac98d0 a2=0 a3=7fff46ac98bc items=0 ppid=2252 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:14.231000 audit[2301]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.231000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec3d0e600 a2=0 a3=7ffec3d0e5ec items=0 ppid=2252 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:14.309128 kubelet[2056]: E0510 00:46:14.309091 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:14.330000 audit[2302]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.330000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd60c1e110 a2=0 a3=7ffd60c1e0fc items=0 ppid=2252 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:14.332000 audit[2304]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.332000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffef4a66c00 a2=0 a3=7ffef4a66bec items=0 ppid=2252 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:46:14.338000 audit[2307]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.338000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdddf7800 a2=0 a3=7fffdddf77ec items=0 ppid=2252 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:46:14.339000 audit[2308]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.339000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6fba68b0 a2=0 a3=7ffd6fba689c items=0 ppid=2252 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:14.341000 audit[2310]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.341000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7dc41f70 a2=0 a3=7ffd7dc41f5c items=0 ppid=2252 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:14.342000 audit[2311]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.342000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd87ff9230 a2=0 a3=7ffd87ff921c items=0 ppid=2252 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:14.345000 audit[2313]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.345000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc332a9cd0 a2=0 a3=7ffc332a9cbc items=0 ppid=2252 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:14.348000 audit[2316]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.348000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe12adbfd0 a2=0 a3=7ffe12adbfbc items=0 ppid=2252 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:46:14.349000 audit[2317]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.349000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff541efcb0 a2=0 a3=7fff541efc9c items=0 ppid=2252 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:14.352000 audit[2319]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.352000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9adb56d0 a2=0 a3=7ffe9adb56bc items=0 ppid=2252 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:14.353000 audit[2320]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.353000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5f4603d0 a2=0 a3=7ffc5f4603bc items=0 ppid=2252 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:14.355000 audit[2322]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.355000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6c71d5e0 a2=0 a3=7ffc6c71d5cc items=0 ppid=2252 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:14.358000 audit[2325]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.358000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc299dae20 a2=0 a3=7ffc299dae0c items=0 ppid=2252 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:14.362000 audit[2328]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.362000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff99fd02e0 a2=0 a3=7fff99fd02cc items=0 ppid=2252 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:14.364000 audit[2329]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.364000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee2bb9080 a2=0 a3=7ffee2bb906c items=0 ppid=2252 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:14.366000 audit[2331]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.366000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffd103e7f0 a2=0 a3=7fffd103e7dc items=0 ppid=2252 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:14.369000 audit[2334]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.369000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4ff83070 a2=0 a3=7fff4ff8305c items=0 ppid=2252 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:14.370000 audit[2335]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.370000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff70b1b980 a2=0 a3=7fff70b1b96c items=0 ppid=2252 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:14.372000 audit[2337]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:14.372000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd5fdbf760 a2=0 a3=7ffd5fdbf74c items=0 ppid=2252 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:14.394000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:14.394000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe0e7153e0 a2=0 a3=7ffe0e7153cc items=0 ppid=2252 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:14.404000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:14.404000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe0e7153e0 a2=0 a3=7ffe0e7153cc items=0 ppid=2252 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:14.405000 audit[2349]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.405000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd982da6d0 a2=0 a3=7ffd982da6bc items=0 ppid=2252 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:14.408000 audit[2351]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.408000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc06e72fa0 a2=0 a3=7ffc06e72f8c items=0 ppid=2252 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:46:14.411000 audit[2354]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.411000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda7b2c770 a2=0 a3=7ffda7b2c75c items=0 ppid=2252 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:46:14.412000 audit[2355]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.412000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc97035690 a2=0 a3=7ffc9703567c items=0 ppid=2252 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:14.414000 audit[2357]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.414000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5b02fbe0 a2=0 a3=7ffc5b02fbcc items=0 ppid=2252 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:14.415000 audit[2358]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.415000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff07dcab50 a2=0 a3=7fff07dcab3c items=0 ppid=2252 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:14.417000 audit[2360]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.417000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1eceb040 a2=0 a3=7ffc1eceb02c items=0 ppid=2252 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:46:14.421000 audit[2363]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.421000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff8e8ba4e0 a2=0 a3=7fff8e8ba4cc items=0 ppid=2252 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:14.422000 audit[2364]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.422000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff00222cc0 a2=0 a3=7fff00222cac items=0 ppid=2252 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:14.424000 audit[2366]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.424000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbd3ae220 a2=0 a3=7ffcbd3ae20c items=0 ppid=2252 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:14.425000 audit[2367]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.425000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1a1edcd0 a2=0 a3=7ffe1a1edcbc items=0 ppid=2252 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:14.427000 audit[2369]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.427000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5481fb70 a2=0 a3=7ffc5481fb5c items=0 ppid=2252 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:14.430000 audit[2372]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.430000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe8fd1270 a2=0 a3=7fffe8fd125c items=0 ppid=2252 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:14.434000 audit[2375]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.434000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd70dce950 a2=0 a3=7ffd70dce93c items=0 ppid=2252 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:46:14.434000 audit[2376]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.434000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffddf9d3060 a2=0 a3=7ffddf9d304c items=0 ppid=2252 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:14.436000 audit[2378]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.436000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff1de19520 a2=0 a3=7fff1de1950c items=0 ppid=2252 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:14.439000 audit[2381]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.439000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff39d89660 a2=0 a3=7fff39d8964c items=0 ppid=2252 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:14.440000 audit[2382]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.440000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaa3133f0 a2=0 a3=7ffcaa3133dc items=0 ppid=2252 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:14.442000 audit[2384]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.442000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffecbcb9500 a2=0 a3=7ffecbcb94ec items=0 ppid=2252 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:14.443000 audit[2385]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.443000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda7278050 a2=0 a3=7ffda727803c items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:46:14.445000 audit[2387]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.445000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffadd74840 a2=0 a3=7fffadd7482c items=0 ppid=2252 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:14.449000 audit[2390]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:14.449000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff15a35fd0 a2=0 a3=7fff15a35fbc items=0 ppid=2252 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:14.452000 audit[2392]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:14.452000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcdcc95a30 a2=0 a3=7ffcdcc95a1c items=0 ppid=2252 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.452000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:14.452000 audit[2392]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:14.452000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcdcc95a30 a2=0 a3=7ffcdcc95a1c items=0 ppid=2252 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.452000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:15.893023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1476454100.mount: Deactivated successfully. May 10 00:46:16.591680 env[1196]: time="2025-05-10T00:46:16.591577275Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.595113 env[1196]: time="2025-05-10T00:46:16.595051947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.597274 env[1196]: time="2025-05-10T00:46:16.597214655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.599082 env[1196]: time="2025-05-10T00:46:16.599041646Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:16.599696 env[1196]: time="2025-05-10T00:46:16.599646806Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:46:16.602285 env[1196]: time="2025-05-10T00:46:16.602234863Z" level=info msg="CreateContainer within sandbox \"0904bffe4e3cb0078bde7a32c8f2cccf9e2f034b18d928a7bacbf122af2a4560\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:46:16.620090 env[1196]: time="2025-05-10T00:46:16.620008561Z" level=info msg="CreateContainer within sandbox \"0904bffe4e3cb0078bde7a32c8f2cccf9e2f034b18d928a7bacbf122af2a4560\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0a560df5451b77554e8eed05e4e30ee119c2f947bbc7eebbeac7df34f6903384\"" May 10 00:46:16.622325 env[1196]: time="2025-05-10T00:46:16.620724711Z" level=info msg="StartContainer for \"0a560df5451b77554e8eed05e4e30ee119c2f947bbc7eebbeac7df34f6903384\"" May 10 00:46:16.636563 systemd[1]: Started cri-containerd-0a560df5451b77554e8eed05e4e30ee119c2f947bbc7eebbeac7df34f6903384.scope. May 10 00:46:16.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit: BPF prog-id=111 op=LOAD May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2177 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353630646635343531623737353534653865656430356534653330 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2177 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353630646635343531623737353534653865656430356534653330 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit: BPF prog-id=112 op=LOAD May 10 00:46:16.651000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002829d0 items=0 ppid=2177 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353630646635343531623737353534653865656430356534653330 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit: BPF prog-id=113 op=LOAD May 10 00:46:16.651000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000282a18 items=0 ppid=2177 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353630646635343531623737353534653865656430356534653330 May 10 00:46:16.651000 audit: BPF prog-id=113 op=UNLOAD May 10 00:46:16.651000 audit: BPF prog-id=112 op=UNLOAD May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.651000 audit: BPF prog-id=114 op=LOAD May 10 00:46:16.651000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000282e28 items=0 ppid=2177 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353630646635343531623737353534653865656430356534653330 May 10 00:46:16.669977 env[1196]: time="2025-05-10T00:46:16.669909868Z" level=info msg="StartContainer for \"0a560df5451b77554e8eed05e4e30ee119c2f947bbc7eebbeac7df34f6903384\" returns successfully" May 10 00:46:17.328461 kubelet[2056]: I0510 00:46:17.328386 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-tzfjc" podStartSLOduration=5.328358192 podStartE2EDuration="5.328358192s" podCreationTimestamp="2025-05-10 00:46:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:14.334529479 +0000 UTC m=+14.180268756" watchObservedRunningTime="2025-05-10 00:46:17.328358192 +0000 UTC m=+17.174097469" May 10 00:46:20.416000 audit[2435]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.417731 kernel: kauditd_printk_skb: 243 callbacks suppressed May 10 00:46:20.417786 kernel: audit: type=1325 audit(1746837980.416:911): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.416000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd9f25bc0 a2=0 a3=7ffcd9f25bac items=0 ppid=2252 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.424963 kernel: audit: type=1300 audit(1746837980.416:911): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd9f25bc0 a2=0 a3=7ffcd9f25bac items=0 ppid=2252 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.425015 kernel: audit: type=1327 audit(1746837980.416:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.428000 audit[2435]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.428000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd9f25bc0 a2=0 a3=0 items=0 ppid=2252 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.437385 kernel: audit: type=1325 audit(1746837980.428:912): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.437539 kernel: audit: type=1300 audit(1746837980.428:912): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd9f25bc0 a2=0 a3=0 items=0 ppid=2252 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.437559 kernel: audit: type=1327 audit(1746837980.428:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.449000 audit[2437]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.449000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe9bcd34e0 a2=0 a3=7ffe9bcd34cc items=0 ppid=2252 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.459589 kernel: audit: type=1325 audit(1746837980.449:913): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.459758 kernel: audit: type=1300 audit(1746837980.449:913): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe9bcd34e0 a2=0 a3=7ffe9bcd34cc items=0 ppid=2252 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.459788 kernel: audit: type=1327 audit(1746837980.449:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.463000 audit[2437]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.463000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe9bcd34e0 a2=0 a3=0 items=0 ppid=2252 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:20.467721 kernel: audit: type=1325 audit(1746837980.463:914): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:20.907800 kubelet[2056]: I0510 00:46:20.907721 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-k69l9" podStartSLOduration=5.742677343 podStartE2EDuration="8.907683278s" podCreationTimestamp="2025-05-10 00:46:12 +0000 UTC" firstStartedPulling="2025-05-10 00:46:13.435779073 +0000 UTC m=+13.281518350" lastFinishedPulling="2025-05-10 00:46:16.600785008 +0000 UTC m=+16.446524285" observedRunningTime="2025-05-10 00:46:17.328583059 +0000 UTC m=+17.174322336" watchObservedRunningTime="2025-05-10 00:46:20.907683278 +0000 UTC m=+20.753422555" May 10 00:46:20.908255 kubelet[2056]: I0510 00:46:20.907885 2056 topology_manager.go:215] "Topology Admit Handler" podUID="e495fc5a-96ed-4fdd-b639-013f935beaba" podNamespace="calico-system" podName="calico-typha-7bbc59b4f6-pthvc" May 10 00:46:20.912412 systemd[1]: Created slice kubepods-besteffort-pode495fc5a_96ed_4fdd_b639_013f935beaba.slice. May 10 00:46:20.987154 kubelet[2056]: I0510 00:46:20.987070 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e495fc5a-96ed-4fdd-b639-013f935beaba-tigera-ca-bundle\") pod \"calico-typha-7bbc59b4f6-pthvc\" (UID: \"e495fc5a-96ed-4fdd-b639-013f935beaba\") " pod="calico-system/calico-typha-7bbc59b4f6-pthvc" May 10 00:46:20.987154 kubelet[2056]: I0510 00:46:20.987137 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45nxs\" (UniqueName: \"kubernetes.io/projected/e495fc5a-96ed-4fdd-b639-013f935beaba-kube-api-access-45nxs\") pod \"calico-typha-7bbc59b4f6-pthvc\" (UID: \"e495fc5a-96ed-4fdd-b639-013f935beaba\") " pod="calico-system/calico-typha-7bbc59b4f6-pthvc" May 10 00:46:20.987402 kubelet[2056]: I0510 00:46:20.987172 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e495fc5a-96ed-4fdd-b639-013f935beaba-typha-certs\") pod \"calico-typha-7bbc59b4f6-pthvc\" (UID: \"e495fc5a-96ed-4fdd-b639-013f935beaba\") " pod="calico-system/calico-typha-7bbc59b4f6-pthvc" May 10 00:46:20.991479 kubelet[2056]: I0510 00:46:20.991435 2056 topology_manager.go:215] "Topology Admit Handler" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" podNamespace="calico-system" podName="calico-node-zks2z" May 10 00:46:20.996886 systemd[1]: Created slice kubepods-besteffort-pod30648fc3_8d2b_45f3_8ce4_28fd3878a684.slice. May 10 00:46:21.088433 kubelet[2056]: I0510 00:46:21.088358 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-run-calico\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088433 kubelet[2056]: I0510 00:46:21.088410 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-xtables-lock\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088661 kubelet[2056]: I0510 00:46:21.088447 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30648fc3-8d2b-45f3-8ce4-28fd3878a684-tigera-ca-bundle\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088661 kubelet[2056]: I0510 00:46:21.088477 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-log-dir\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088661 kubelet[2056]: I0510 00:46:21.088604 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-flexvol-driver-host\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088785 kubelet[2056]: I0510 00:46:21.088767 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-lib-modules\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088816 kubelet[2056]: I0510 00:46:21.088786 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-lib-calico\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088816 kubelet[2056]: I0510 00:46:21.088803 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-policysync\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088879 kubelet[2056]: I0510 00:46:21.088821 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-net-dir\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088879 kubelet[2056]: I0510 00:46:21.088847 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ftk2f\" (UniqueName: \"kubernetes.io/projected/30648fc3-8d2b-45f3-8ce4-28fd3878a684-kube-api-access-ftk2f\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.088946 kubelet[2056]: I0510 00:46:21.088939 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/30648fc3-8d2b-45f3-8ce4-28fd3878a684-node-certs\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.089045 kubelet[2056]: I0510 00:46:21.089026 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-bin-dir\") pod \"calico-node-zks2z\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " pod="calico-system/calico-node-zks2z" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190546 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.191994 kubelet[2056]: W0510 00:46:21.190579 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190620 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190778 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.191994 kubelet[2056]: W0510 00:46:21.190787 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190804 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190938 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.191994 kubelet[2056]: W0510 00:46:21.190946 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.190962 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.191994 kubelet[2056]: E0510 00:46:21.191152 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192511 kubelet[2056]: W0510 00:46:21.191167 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191176 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191340 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192511 kubelet[2056]: W0510 00:46:21.191349 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191362 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191489 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192511 kubelet[2056]: W0510 00:46:21.191499 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191508 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192511 kubelet[2056]: E0510 00:46:21.191642 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192511 kubelet[2056]: W0510 00:46:21.191655 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.191664 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.191837 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192749 kubelet[2056]: W0510 00:46:21.191845 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.191854 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.191990 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192749 kubelet[2056]: W0510 00:46:21.191998 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.192008 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.192199 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192749 kubelet[2056]: W0510 00:46:21.192209 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192749 kubelet[2056]: E0510 00:46:21.192224 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192413 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192967 kubelet[2056]: W0510 00:46:21.192422 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192437 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192593 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192967 kubelet[2056]: W0510 00:46:21.192602 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192610 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192789 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.192967 kubelet[2056]: W0510 00:46:21.192798 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.192967 kubelet[2056]: E0510 00:46:21.192812 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.196889 kubelet[2056]: E0510 00:46:21.196858 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.196889 kubelet[2056]: W0510 00:46:21.196883 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.197018 kubelet[2056]: E0510 00:46:21.196907 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.215605 kubelet[2056]: E0510 00:46:21.215545 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:21.216378 env[1196]: time="2025-05-10T00:46:21.216323071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7bbc59b4f6-pthvc,Uid:e495fc5a-96ed-4fdd-b639-013f935beaba,Namespace:calico-system,Attempt:0,}" May 10 00:46:21.290363 kubelet[2056]: E0510 00:46:21.290327 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.290363 kubelet[2056]: W0510 00:46:21.290347 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.290363 kubelet[2056]: E0510 00:46:21.290367 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.314729 kubelet[2056]: E0510 00:46:21.314684 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.314729 kubelet[2056]: W0510 00:46:21.314726 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.314884 kubelet[2056]: E0510 00:46:21.314749 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.454306 kubelet[2056]: I0510 00:46:21.452642 2056 topology_manager.go:215] "Topology Admit Handler" podUID="d85926ec-2929-465e-88c7-112e20f322a9" podNamespace="calico-system" podName="csi-node-driver-6m6bf" May 10 00:46:21.454306 kubelet[2056]: E0510 00:46:21.453028 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:21.468055 env[1196]: time="2025-05-10T00:46:21.467939526Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.468055 env[1196]: time="2025-05-10T00:46:21.467989540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.468055 env[1196]: time="2025-05-10T00:46:21.468001994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.468263 env[1196]: time="2025-05-10T00:46:21.468167128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48766428d82184c58d99c4a65b9d61d1ae1c39bef95b4d763d3102dce829f5ff pid=2464 runtime=io.containerd.runc.v2 May 10 00:46:21.471283 kubelet[2056]: E0510 00:46:21.471251 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.471283 kubelet[2056]: W0510 00:46:21.471278 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.471446 kubelet[2056]: E0510 00:46:21.471304 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.471476 kubelet[2056]: E0510 00:46:21.471466 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.471500 kubelet[2056]: W0510 00:46:21.471477 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.471500 kubelet[2056]: E0510 00:46:21.471488 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.471670 kubelet[2056]: E0510 00:46:21.471643 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.471670 kubelet[2056]: W0510 00:46:21.471660 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.471670 kubelet[2056]: E0510 00:46:21.471672 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.471849 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.473765 kubelet[2056]: W0510 00:46:21.471864 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.471874 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.472030 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.473765 kubelet[2056]: W0510 00:46:21.472039 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.472047 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.472199 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.473765 kubelet[2056]: W0510 00:46:21.472207 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.472217 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.473765 kubelet[2056]: E0510 00:46:21.472356 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474100 kubelet[2056]: W0510 00:46:21.472364 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472373 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472513 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474100 kubelet[2056]: W0510 00:46:21.472523 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472535 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472697 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474100 kubelet[2056]: W0510 00:46:21.472721 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472731 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474100 kubelet[2056]: E0510 00:46:21.472874 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474100 kubelet[2056]: W0510 00:46:21.472882 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.472891 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473024 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474340 kubelet[2056]: W0510 00:46:21.473033 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473044 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473197 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474340 kubelet[2056]: W0510 00:46:21.473206 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473215 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473361 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474340 kubelet[2056]: W0510 00:46:21.473369 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474340 kubelet[2056]: E0510 00:46:21.473377 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.473522 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474601 kubelet[2056]: W0510 00:46:21.473530 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.473539 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.473679 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474601 kubelet[2056]: W0510 00:46:21.473689 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.473698 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.474183 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474601 kubelet[2056]: W0510 00:46:21.474195 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.474207 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474601 kubelet[2056]: E0510 00:46:21.474383 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474878 kubelet[2056]: W0510 00:46:21.474392 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474878 kubelet[2056]: E0510 00:46:21.474407 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474878 kubelet[2056]: E0510 00:46:21.474547 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474878 kubelet[2056]: W0510 00:46:21.474556 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474878 kubelet[2056]: E0510 00:46:21.474565 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.474878 kubelet[2056]: E0510 00:46:21.474724 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.474878 kubelet[2056]: W0510 00:46:21.474733 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.474878 kubelet[2056]: E0510 00:46:21.474742 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.475076 kubelet[2056]: E0510 00:46:21.474931 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.475076 kubelet[2056]: W0510 00:46:21.474942 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.475076 kubelet[2056]: E0510 00:46:21.474968 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.479000 audit[2501]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.479000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc86f54170 a2=0 a3=7ffc86f5415c items=0 ppid=2252 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.483000 audit[2501]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.483000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc86f54170 a2=0 a3=0 items=0 ppid=2252 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.489782 systemd[1]: Started cri-containerd-48766428d82184c58d99c4a65b9d61d1ae1c39bef95b4d763d3102dce829f5ff.scope. May 10 00:46:21.491409 kubelet[2056]: E0510 00:46:21.491378 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.491409 kubelet[2056]: W0510 00:46:21.491405 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.491528 kubelet[2056]: E0510 00:46:21.491429 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.491528 kubelet[2056]: I0510 00:46:21.491454 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d85926ec-2929-465e-88c7-112e20f322a9-registration-dir\") pod \"csi-node-driver-6m6bf\" (UID: \"d85926ec-2929-465e-88c7-112e20f322a9\") " pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:21.491671 kubelet[2056]: E0510 00:46:21.491654 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.491671 kubelet[2056]: W0510 00:46:21.491667 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.491771 kubelet[2056]: E0510 00:46:21.491686 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.491771 kubelet[2056]: I0510 00:46:21.491715 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d85926ec-2929-465e-88c7-112e20f322a9-kubelet-dir\") pod \"csi-node-driver-6m6bf\" (UID: \"d85926ec-2929-465e-88c7-112e20f322a9\") " pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:21.492810 kubelet[2056]: E0510 00:46:21.492783 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.492883 kubelet[2056]: W0510 00:46:21.492813 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.492883 kubelet[2056]: E0510 00:46:21.492840 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.493056 kubelet[2056]: E0510 00:46:21.493039 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.493056 kubelet[2056]: W0510 00:46:21.493058 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.493172 kubelet[2056]: E0510 00:46:21.493112 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.494889 kubelet[2056]: E0510 00:46:21.494868 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.494889 kubelet[2056]: W0510 00:46:21.494888 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.495177 kubelet[2056]: E0510 00:46:21.495019 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.495177 kubelet[2056]: I0510 00:46:21.495072 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m7tpv\" (UniqueName: \"kubernetes.io/projected/d85926ec-2929-465e-88c7-112e20f322a9-kube-api-access-m7tpv\") pod \"csi-node-driver-6m6bf\" (UID: \"d85926ec-2929-465e-88c7-112e20f322a9\") " pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:21.495265 kubelet[2056]: E0510 00:46:21.495192 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.495265 kubelet[2056]: W0510 00:46:21.495200 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.495265 kubelet[2056]: E0510 00:46:21.495212 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.495518 kubelet[2056]: E0510 00:46:21.495491 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.495518 kubelet[2056]: W0510 00:46:21.495504 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.495518 kubelet[2056]: E0510 00:46:21.495518 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.495823 kubelet[2056]: E0510 00:46:21.495795 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.495823 kubelet[2056]: W0510 00:46:21.495808 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.495823 kubelet[2056]: E0510 00:46:21.495826 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.495981 kubelet[2056]: I0510 00:46:21.495852 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d85926ec-2929-465e-88c7-112e20f322a9-varrun\") pod \"csi-node-driver-6m6bf\" (UID: \"d85926ec-2929-465e-88c7-112e20f322a9\") " pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:21.496152 kubelet[2056]: E0510 00:46:21.496128 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.496152 kubelet[2056]: W0510 00:46:21.496151 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.496235 kubelet[2056]: E0510 00:46:21.496167 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.496235 kubelet[2056]: I0510 00:46:21.496185 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d85926ec-2929-465e-88c7-112e20f322a9-socket-dir\") pod \"csi-node-driver-6m6bf\" (UID: \"d85926ec-2929-465e-88c7-112e20f322a9\") " pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:21.496410 kubelet[2056]: E0510 00:46:21.496394 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.496410 kubelet[2056]: W0510 00:46:21.496410 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.496535 kubelet[2056]: E0510 00:46:21.496504 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.496646 kubelet[2056]: E0510 00:46:21.496628 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.496646 kubelet[2056]: W0510 00:46:21.496641 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.496844 kubelet[2056]: E0510 00:46:21.496796 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.496903 kubelet[2056]: E0510 00:46:21.496866 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.496903 kubelet[2056]: W0510 00:46:21.496877 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.496903 kubelet[2056]: E0510 00:46:21.496893 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.497090 kubelet[2056]: E0510 00:46:21.497071 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.497090 kubelet[2056]: W0510 00:46:21.497084 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.497090 kubelet[2056]: E0510 00:46:21.497093 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.497327 kubelet[2056]: E0510 00:46:21.497311 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.497327 kubelet[2056]: W0510 00:46:21.497325 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.497403 kubelet[2056]: E0510 00:46:21.497334 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.497513 kubelet[2056]: E0510 00:46:21.497495 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.497513 kubelet[2056]: W0510 00:46:21.497508 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.497587 kubelet[2056]: E0510 00:46:21.497517 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.504000 audit: BPF prog-id=115 op=LOAD May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2464 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373636343238643832313834633538643939633461363562396436 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2464 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373636343238643832313834633538643939633461363562396436 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit: BPF prog-id=116 op=LOAD May 10 00:46:21.505000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025ba20 items=0 ppid=2464 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373636343238643832313834633538643939633461363562396436 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit: BPF prog-id=117 op=LOAD May 10 00:46:21.505000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025ba68 items=0 ppid=2464 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373636343238643832313834633538643939633461363562396436 May 10 00:46:21.505000 audit: BPF prog-id=117 op=UNLOAD May 10 00:46:21.505000 audit: BPF prog-id=116 op=UNLOAD May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.505000 audit: BPF prog-id=118 op=LOAD May 10 00:46:21.505000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025be78 items=0 ppid=2464 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373636343238643832313834633538643939633461363562396436 May 10 00:46:21.531285 env[1196]: time="2025-05-10T00:46:21.531232602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7bbc59b4f6-pthvc,Uid:e495fc5a-96ed-4fdd-b639-013f935beaba,Namespace:calico-system,Attempt:0,} returns sandbox id \"48766428d82184c58d99c4a65b9d61d1ae1c39bef95b4d763d3102dce829f5ff\"" May 10 00:46:21.531993 kubelet[2056]: E0510 00:46:21.531955 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:21.533196 env[1196]: time="2025-05-10T00:46:21.533149780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:46:21.597503 kubelet[2056]: E0510 00:46:21.597460 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.597503 kubelet[2056]: W0510 00:46:21.597496 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.597775 kubelet[2056]: E0510 00:46:21.597528 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.597958 kubelet[2056]: E0510 00:46:21.597929 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.597958 kubelet[2056]: W0510 00:46:21.597944 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.597958 kubelet[2056]: E0510 00:46:21.597962 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.598237 kubelet[2056]: E0510 00:46:21.598192 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.598237 kubelet[2056]: W0510 00:46:21.598203 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.598237 kubelet[2056]: E0510 00:46:21.598219 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.598400 kubelet[2056]: E0510 00:46:21.598383 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.598400 kubelet[2056]: W0510 00:46:21.598396 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.598400 kubelet[2056]: E0510 00:46:21.598412 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.598580 kubelet[2056]: E0510 00:46:21.598561 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.598580 kubelet[2056]: W0510 00:46:21.598574 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.598580 kubelet[2056]: E0510 00:46:21.598588 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.598888 kubelet[2056]: E0510 00:46:21.598769 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.598888 kubelet[2056]: W0510 00:46:21.598778 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.598888 kubelet[2056]: E0510 00:46:21.598791 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.598991 kubelet[2056]: E0510 00:46:21.598932 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:21.599218 kubelet[2056]: E0510 00:46:21.599185 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.599218 kubelet[2056]: W0510 00:46:21.599215 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.599299 kubelet[2056]: E0510 00:46:21.599228 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.601759 kubelet[2056]: E0510 00:46:21.599415 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.601759 kubelet[2056]: W0510 00:46:21.599431 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.601759 kubelet[2056]: E0510 00:46:21.599450 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.602381 env[1196]: time="2025-05-10T00:46:21.599829753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zks2z,Uid:30648fc3-8d2b-45f3-8ce4-28fd3878a684,Namespace:calico-system,Attempt:0,}" May 10 00:46:21.602438 kubelet[2056]: E0510 00:46:21.602117 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.602438 kubelet[2056]: W0510 00:46:21.602132 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.602438 kubelet[2056]: E0510 00:46:21.602180 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.602438 kubelet[2056]: E0510 00:46:21.602413 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.602438 kubelet[2056]: W0510 00:46:21.602424 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.602601 kubelet[2056]: E0510 00:46:21.602454 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.602601 kubelet[2056]: E0510 00:46:21.602579 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.602601 kubelet[2056]: W0510 00:46:21.602586 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.602719 kubelet[2056]: E0510 00:46:21.602651 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.602827 kubelet[2056]: E0510 00:46:21.602813 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.602827 kubelet[2056]: W0510 00:46:21.602824 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.602921 kubelet[2056]: E0510 00:46:21.602855 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.603057 kubelet[2056]: E0510 00:46:21.603034 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.603101 kubelet[2056]: W0510 00:46:21.603051 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.603169 kubelet[2056]: E0510 00:46:21.603150 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.603337 kubelet[2056]: E0510 00:46:21.603318 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.603337 kubelet[2056]: W0510 00:46:21.603330 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.603394 kubelet[2056]: E0510 00:46:21.603349 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.603608 kubelet[2056]: E0510 00:46:21.603588 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.603666 kubelet[2056]: W0510 00:46:21.603614 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.603666 kubelet[2056]: E0510 00:46:21.603631 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.603944 kubelet[2056]: E0510 00:46:21.603929 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.603944 kubelet[2056]: W0510 00:46:21.603943 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.604033 kubelet[2056]: E0510 00:46:21.603961 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.604203 kubelet[2056]: E0510 00:46:21.604160 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.604203 kubelet[2056]: W0510 00:46:21.604177 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.604413 kubelet[2056]: E0510 00:46:21.604284 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.604413 kubelet[2056]: E0510 00:46:21.604372 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.604413 kubelet[2056]: W0510 00:46:21.604381 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.604506 kubelet[2056]: E0510 00:46:21.604454 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.604560 kubelet[2056]: E0510 00:46:21.604542 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.604560 kubelet[2056]: W0510 00:46:21.604553 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.604642 kubelet[2056]: E0510 00:46:21.604624 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.604743 kubelet[2056]: E0510 00:46:21.604717 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.604743 kubelet[2056]: W0510 00:46:21.604729 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.604859 kubelet[2056]: E0510 00:46:21.604835 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.604944 kubelet[2056]: E0510 00:46:21.604930 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.604944 kubelet[2056]: W0510 00:46:21.604941 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.605019 kubelet[2056]: E0510 00:46:21.604956 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.605247 kubelet[2056]: E0510 00:46:21.605233 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.605247 kubelet[2056]: W0510 00:46:21.605244 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.605315 kubelet[2056]: E0510 00:46:21.605257 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.605434 kubelet[2056]: E0510 00:46:21.605417 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.605434 kubelet[2056]: W0510 00:46:21.605428 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.605523 kubelet[2056]: E0510 00:46:21.605440 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.605594 kubelet[2056]: E0510 00:46:21.605577 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.605594 kubelet[2056]: W0510 00:46:21.605586 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.605594 kubelet[2056]: E0510 00:46:21.605596 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.605788 kubelet[2056]: E0510 00:46:21.605772 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.605788 kubelet[2056]: W0510 00:46:21.605785 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.605869 kubelet[2056]: E0510 00:46:21.605793 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.616293 kubelet[2056]: E0510 00:46:21.616252 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:21.616293 kubelet[2056]: W0510 00:46:21.616279 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:21.616479 kubelet[2056]: E0510 00:46:21.616306 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:21.624257 env[1196]: time="2025-05-10T00:46:21.624150792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.624257 env[1196]: time="2025-05-10T00:46:21.624235722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.624257 env[1196]: time="2025-05-10T00:46:21.624261672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.625057 env[1196]: time="2025-05-10T00:46:21.624546071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01 pid=2568 runtime=io.containerd.runc.v2 May 10 00:46:21.634660 systemd[1]: Started cri-containerd-79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01.scope. May 10 00:46:21.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.650000 audit: BPF prog-id=119 op=LOAD May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653831316666356437366362613938636535373434343230633564 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653831316666356437366362613938636535373434343230633564 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit: BPF prog-id=120 op=LOAD May 10 00:46:21.651000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ccb70 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653831316666356437366362613938636535373434343230633564 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit: BPF prog-id=121 op=LOAD May 10 00:46:21.651000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ccbb8 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653831316666356437366362613938636535373434343230633564 May 10 00:46:21.651000 audit: BPF prog-id=121 op=UNLOAD May 10 00:46:21.651000 audit: BPF prog-id=120 op=UNLOAD May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.651000 audit: BPF prog-id=122 op=LOAD May 10 00:46:21.651000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ccfc8 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653831316666356437366362613938636535373434343230633564 May 10 00:46:21.668984 env[1196]: time="2025-05-10T00:46:21.668908979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zks2z,Uid:30648fc3-8d2b-45f3-8ce4-28fd3878a684,Namespace:calico-system,Attempt:0,} returns sandbox id \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\"" May 10 00:46:21.669900 kubelet[2056]: E0510 00:46:21.669872 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:23.258499 kubelet[2056]: E0510 00:46:23.258430 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:25.258973 kubelet[2056]: E0510 00:46:25.258915 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:26.268909 env[1196]: time="2025-05-10T00:46:26.268851072Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.271181 env[1196]: time="2025-05-10T00:46:26.271116977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.273154 env[1196]: time="2025-05-10T00:46:26.273104876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.274939 env[1196]: time="2025-05-10T00:46:26.274890421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.275323 env[1196]: time="2025-05-10T00:46:26.275290359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:46:26.276374 env[1196]: time="2025-05-10T00:46:26.276342674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:46:26.287100 env[1196]: time="2025-05-10T00:46:26.287053990Z" level=info msg="CreateContainer within sandbox \"48766428d82184c58d99c4a65b9d61d1ae1c39bef95b4d763d3102dce829f5ff\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:46:26.301460 env[1196]: time="2025-05-10T00:46:26.301393794Z" level=info msg="CreateContainer within sandbox \"48766428d82184c58d99c4a65b9d61d1ae1c39bef95b4d763d3102dce829f5ff\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2d7012bffa4f8248e718b409915597905d7976663bcf0fbb80d0533d3e68d4f7\"" May 10 00:46:26.302033 env[1196]: time="2025-05-10T00:46:26.302001165Z" level=info msg="StartContainer for \"2d7012bffa4f8248e718b409915597905d7976663bcf0fbb80d0533d3e68d4f7\"" May 10 00:46:26.315513 systemd[1]: Started cri-containerd-2d7012bffa4f8248e718b409915597905d7976663bcf0fbb80d0533d3e68d4f7.scope. May 10 00:46:26.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.333409 kernel: kauditd_printk_skb: 122 callbacks suppressed May 10 00:46:26.333473 kernel: audit: type=1400 audit(1746837986.330:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.343526 kernel: audit: type=1400 audit(1746837986.330:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.343655 kernel: audit: type=1400 audit(1746837986.330:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.350770 kernel: audit: type=1400 audit(1746837986.330:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.350864 kernel: audit: type=1400 audit(1746837986.330:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.354064 kernel: audit: type=1400 audit(1746837986.330:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.354147 kernel: audit: type=1400 audit(1746837986.330:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.360770 kernel: audit: type=1400 audit(1746837986.330:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.363883 kernel: audit: type=1400 audit(1746837986.330:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.363940 kernel: audit: type=1400 audit(1746837986.334:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.334000 audit: BPF prog-id=123 op=LOAD May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2464 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373031326266666134663832343865373138623430393931353539 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2464 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373031326266666134663832343865373138623430393931353539 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.335000 audit: BPF prog-id=124 op=LOAD May 10 00:46:26.335000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000232b00 items=0 ppid=2464 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373031326266666134663832343865373138623430393931353539 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.342000 audit: BPF prog-id=125 op=LOAD May 10 00:46:26.342000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000232b48 items=0 ppid=2464 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373031326266666134663832343865373138623430393931353539 May 10 00:46:26.345000 audit: BPF prog-id=125 op=UNLOAD May 10 00:46:26.345000 audit: BPF prog-id=124 op=UNLOAD May 10 00:46:26.345000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.345000 audit: BPF prog-id=126 op=LOAD May 10 00:46:26.345000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000232f58 items=0 ppid=2464 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373031326266666134663832343865373138623430393931353539 May 10 00:46:26.390738 env[1196]: time="2025-05-10T00:46:26.389649301Z" level=info msg="StartContainer for \"2d7012bffa4f8248e718b409915597905d7976663bcf0fbb80d0533d3e68d4f7\" returns successfully" May 10 00:46:27.258345 kubelet[2056]: E0510 00:46:27.258294 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:27.335945 kubelet[2056]: E0510 00:46:27.335909 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:27.389231 kubelet[2056]: I0510 00:46:27.388784 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7bbc59b4f6-pthvc" podStartSLOduration=2.645234559 podStartE2EDuration="7.388763651s" podCreationTimestamp="2025-05-10 00:46:20 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.532565191 +0000 UTC m=+21.378304468" lastFinishedPulling="2025-05-10 00:46:26.276094283 +0000 UTC m=+26.121833560" observedRunningTime="2025-05-10 00:46:27.388533043 +0000 UTC m=+27.234272321" watchObservedRunningTime="2025-05-10 00:46:27.388763651 +0000 UTC m=+27.234502928" May 10 00:46:27.410277 kubelet[2056]: E0510 00:46:27.410218 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.410277 kubelet[2056]: W0510 00:46:27.410256 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.410277 kubelet[2056]: E0510 00:46:27.410281 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.410896 kubelet[2056]: E0510 00:46:27.410493 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.410896 kubelet[2056]: W0510 00:46:27.410502 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.410896 kubelet[2056]: E0510 00:46:27.410511 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.410896 kubelet[2056]: E0510 00:46:27.410719 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.410896 kubelet[2056]: W0510 00:46:27.410729 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.410896 kubelet[2056]: E0510 00:46:27.410738 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.411090 kubelet[2056]: E0510 00:46:27.411038 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.411090 kubelet[2056]: W0510 00:46:27.411075 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.411171 kubelet[2056]: E0510 00:46:27.411109 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.411401 kubelet[2056]: E0510 00:46:27.411386 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.411401 kubelet[2056]: W0510 00:46:27.411397 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.411401 kubelet[2056]: E0510 00:46:27.411413 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.411624 kubelet[2056]: E0510 00:46:27.411608 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.411624 kubelet[2056]: W0510 00:46:27.411619 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.411742 kubelet[2056]: E0510 00:46:27.411638 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.411870 kubelet[2056]: E0510 00:46:27.411853 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.411870 kubelet[2056]: W0510 00:46:27.411865 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.411981 kubelet[2056]: E0510 00:46:27.411881 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.412095 kubelet[2056]: E0510 00:46:27.412081 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.412095 kubelet[2056]: W0510 00:46:27.412092 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.412189 kubelet[2056]: E0510 00:46:27.412102 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.412360 kubelet[2056]: E0510 00:46:27.412338 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.412360 kubelet[2056]: W0510 00:46:27.412349 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.412360 kubelet[2056]: E0510 00:46:27.412359 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.412591 kubelet[2056]: E0510 00:46:27.412564 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.412591 kubelet[2056]: W0510 00:46:27.412578 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.412591 kubelet[2056]: E0510 00:46:27.412589 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.412877 kubelet[2056]: E0510 00:46:27.412809 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.412877 kubelet[2056]: W0510 00:46:27.412824 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.412877 kubelet[2056]: E0510 00:46:27.412841 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.413067 kubelet[2056]: E0510 00:46:27.413053 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.413067 kubelet[2056]: W0510 00:46:27.413066 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.413161 kubelet[2056]: E0510 00:46:27.413076 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.413300 kubelet[2056]: E0510 00:46:27.413283 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.413361 kubelet[2056]: W0510 00:46:27.413298 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.413361 kubelet[2056]: E0510 00:46:27.413313 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.413514 kubelet[2056]: E0510 00:46:27.413501 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.413514 kubelet[2056]: W0510 00:46:27.413511 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.413597 kubelet[2056]: E0510 00:46:27.413522 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.413716 kubelet[2056]: E0510 00:46:27.413695 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.413760 kubelet[2056]: W0510 00:46:27.413716 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.413760 kubelet[2056]: E0510 00:46:27.413726 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.442306 kubelet[2056]: E0510 00:46:27.442271 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.442306 kubelet[2056]: W0510 00:46:27.442296 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.442465 kubelet[2056]: E0510 00:46:27.442316 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.442510 kubelet[2056]: E0510 00:46:27.442485 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.442510 kubelet[2056]: W0510 00:46:27.442494 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.442510 kubelet[2056]: E0510 00:46:27.442505 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.442676 kubelet[2056]: E0510 00:46:27.442659 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.442760 kubelet[2056]: W0510 00:46:27.442674 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.442760 kubelet[2056]: E0510 00:46:27.442690 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.442900 kubelet[2056]: E0510 00:46:27.442882 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.442900 kubelet[2056]: W0510 00:46:27.442896 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.442993 kubelet[2056]: E0510 00:46:27.442916 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.443088 kubelet[2056]: E0510 00:46:27.443071 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.443088 kubelet[2056]: W0510 00:46:27.443084 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.443202 kubelet[2056]: E0510 00:46:27.443105 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.443447 kubelet[2056]: E0510 00:46:27.443364 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.443447 kubelet[2056]: W0510 00:46:27.443382 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.443447 kubelet[2056]: E0510 00:46:27.443400 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.443581 kubelet[2056]: E0510 00:46:27.443565 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.443581 kubelet[2056]: W0510 00:46:27.443577 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.443657 kubelet[2056]: E0510 00:46:27.443593 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.443838 kubelet[2056]: E0510 00:46:27.443787 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.443838 kubelet[2056]: W0510 00:46:27.443812 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.443838 kubelet[2056]: E0510 00:46:27.443832 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.444020 kubelet[2056]: E0510 00:46:27.443994 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.444020 kubelet[2056]: W0510 00:46:27.444006 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.444114 kubelet[2056]: E0510 00:46:27.444027 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.444215 kubelet[2056]: E0510 00:46:27.444201 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.444285 kubelet[2056]: W0510 00:46:27.444215 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.444285 kubelet[2056]: E0510 00:46:27.444237 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.444429 kubelet[2056]: E0510 00:46:27.444415 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.444429 kubelet[2056]: W0510 00:46:27.444425 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.444547 kubelet[2056]: E0510 00:46:27.444436 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.444690 kubelet[2056]: E0510 00:46:27.444670 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.444690 kubelet[2056]: W0510 00:46:27.444679 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.444690 kubelet[2056]: E0510 00:46:27.444689 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.444883 kubelet[2056]: E0510 00:46:27.444870 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.444883 kubelet[2056]: W0510 00:46:27.444878 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.444985 kubelet[2056]: E0510 00:46:27.444888 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.445053 kubelet[2056]: E0510 00:46:27.445037 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.445053 kubelet[2056]: W0510 00:46:27.445053 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.445147 kubelet[2056]: E0510 00:46:27.445068 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.445285 kubelet[2056]: E0510 00:46:27.445261 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.445285 kubelet[2056]: W0510 00:46:27.445282 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.445354 kubelet[2056]: E0510 00:46:27.445296 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.445535 kubelet[2056]: E0510 00:46:27.445511 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.445535 kubelet[2056]: W0510 00:46:27.445535 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.445649 kubelet[2056]: E0510 00:46:27.445550 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.445788 kubelet[2056]: E0510 00:46:27.445775 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.445788 kubelet[2056]: W0510 00:46:27.445787 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.445891 kubelet[2056]: E0510 00:46:27.445801 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.445978 kubelet[2056]: E0510 00:46:27.445963 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:27.445978 kubelet[2056]: W0510 00:46:27.445974 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:27.446051 kubelet[2056]: E0510 00:46:27.445984 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:27.479000 audit[2677]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:27.479000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffea32e4760 a2=0 a3=7ffea32e474c items=0 ppid=2252 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:27.489000 audit[2677]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:27.489000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffea32e4760 a2=0 a3=7ffea32e474c items=0 ppid=2252 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:28.024344 env[1196]: time="2025-05-10T00:46:28.024264383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.027223 env[1196]: time="2025-05-10T00:46:28.027138670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.029025 env[1196]: time="2025-05-10T00:46:28.028985070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.030457 env[1196]: time="2025-05-10T00:46:28.030408858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.030745 env[1196]: time="2025-05-10T00:46:28.030714708Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:46:28.032975 env[1196]: time="2025-05-10T00:46:28.032943932Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:46:28.050841 env[1196]: time="2025-05-10T00:46:28.050792308Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\"" May 10 00:46:28.051740 env[1196]: time="2025-05-10T00:46:28.051317243Z" level=info msg="StartContainer for \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\"" May 10 00:46:28.070012 systemd[1]: Started cri-containerd-c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7.scope. May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6b88158238 items=0 ppid=2568 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313836386264396365376131666135646634313734396438376362 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit: BPF prog-id=127 op=LOAD May 10 00:46:28.084000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=2568 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313836386264396365376131666135646634313734396438376362 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.084000 audit: BPF prog-id=128 op=LOAD May 10 00:46:28.084000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=2568 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313836386264396365376131666135646634313734396438376362 May 10 00:46:28.085000 audit: BPF prog-id=128 op=UNLOAD May 10 00:46:28.085000 audit: BPF prog-id=127 op=UNLOAD May 10 00:46:28.085000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.085000 audit: BPF prog-id=129 op=LOAD May 10 00:46:28.085000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=2568 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313836386264396365376131666135646634313734396438376362 May 10 00:46:28.100004 env[1196]: time="2025-05-10T00:46:28.099941063Z" level=info msg="StartContainer for \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\" returns successfully" May 10 00:46:28.109933 systemd[1]: cri-containerd-c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7.scope: Deactivated successfully. May 10 00:46:28.113000 audit: BPF prog-id=129 op=UNLOAD May 10 00:46:28.280859 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7-rootfs.mount: Deactivated successfully. May 10 00:46:28.338323 kubelet[2056]: E0510 00:46:28.338188 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:28.338767 kubelet[2056]: E0510 00:46:28.338432 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:28.917727 env[1196]: time="2025-05-10T00:46:28.917657840Z" level=info msg="shim disconnected" id=c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7 May 10 00:46:28.918146 env[1196]: time="2025-05-10T00:46:28.917739305Z" level=warning msg="cleaning up after shim disconnected" id=c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7 namespace=k8s.io May 10 00:46:28.918146 env[1196]: time="2025-05-10T00:46:28.917753211Z" level=info msg="cleaning up dead shim" May 10 00:46:28.924591 env[1196]: time="2025-05-10T00:46:28.924541696Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2730 runtime=io.containerd.runc.v2\n" May 10 00:46:29.258489 kubelet[2056]: E0510 00:46:29.258364 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:29.341055 kubelet[2056]: E0510 00:46:29.341016 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:29.341429 kubelet[2056]: E0510 00:46:29.341226 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:29.342219 env[1196]: time="2025-05-10T00:46:29.342182479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:46:31.259376 kubelet[2056]: E0510 00:46:31.259231 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:31.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:31.854232 systemd[1]: Started sshd@7-10.0.0.118:22-10.0.0.1:53346.service. May 10 00:46:31.887472 kernel: kauditd_printk_skb: 97 callbacks suppressed May 10 00:46:31.887627 kernel: audit: type=1130 audit(1746837991.852:980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:31.936000 audit[2744]: USER_ACCT pid=2744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.938682 sshd[2744]: Accepted publickey for core from 10.0.0.1 port 53346 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:31.941000 audit[2744]: CRED_ACQ pid=2744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.943954 sshd[2744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:31.948016 kernel: audit: type=1101 audit(1746837991.936:981): pid=2744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.948089 kernel: audit: type=1103 audit(1746837991.941:982): pid=2744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.948128 kernel: audit: type=1006 audit(1746837991.941:983): pid=2744 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:46:31.941000 audit[2744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd160c8040 a2=3 a3=0 items=0 ppid=1 pid=2744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:31.951914 systemd-logind[1181]: New session 8 of user core. May 10 00:46:31.953334 systemd[1]: Started session-8.scope. May 10 00:46:31.956116 kernel: audit: type=1300 audit(1746837991.941:983): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd160c8040 a2=3 a3=0 items=0 ppid=1 pid=2744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:31.956214 kernel: audit: type=1327 audit(1746837991.941:983): proctitle=737368643A20636F7265205B707269765D May 10 00:46:31.941000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:31.957000 audit[2744]: USER_START pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.958000 audit[2746]: CRED_ACQ pid=2746 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.975750 kernel: audit: type=1105 audit(1746837991.957:984): pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:31.975801 kernel: audit: type=1103 audit(1746837991.958:985): pid=2746 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.132747 sshd[2744]: pam_unix(sshd:session): session closed for user core May 10 00:46:32.132000 audit[2744]: USER_END pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.135475 systemd[1]: sshd@7-10.0.0.118:22-10.0.0.1:53346.service: Deactivated successfully. May 10 00:46:32.136378 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:46:32.137095 systemd-logind[1181]: Session 8 logged out. Waiting for processes to exit. May 10 00:46:32.137939 systemd-logind[1181]: Removed session 8. May 10 00:46:32.132000 audit[2744]: CRED_DISP pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.142783 kernel: audit: type=1106 audit(1746837992.132:986): pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.142852 kernel: audit: type=1104 audit(1746837992.132:987): pid=2744 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.263388 kubelet[2056]: E0510 00:46:33.263307 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:35.259014 kubelet[2056]: E0510 00:46:35.258959 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:37.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.137323 systemd[1]: Started sshd@8-10.0.0.118:22-10.0.0.1:42648.service. May 10 00:46:37.157872 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:37.158061 kernel: audit: type=1130 audit(1746837997.135:989): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.195000 audit[2758]: USER_ACCT pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.197453 sshd[2758]: Accepted publickey for core from 10.0.0.1 port 42648 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:37.206000 audit[2758]: CRED_ACQ pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.208726 sshd[2758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:37.213369 kernel: audit: type=1101 audit(1746837997.195:990): pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.213444 kernel: audit: type=1103 audit(1746837997.206:991): pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.213465 kernel: audit: type=1006 audit(1746837997.206:992): pid=2758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:46:37.213104 systemd[1]: Started session-9.scope. May 10 00:46:37.213596 systemd-logind[1181]: New session 9 of user core. May 10 00:46:37.206000 audit[2758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c17cd50 a2=3 a3=0 items=0 ppid=1 pid=2758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.206000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:37.229208 kernel: audit: type=1300 audit(1746837997.206:992): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c17cd50 a2=3 a3=0 items=0 ppid=1 pid=2758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.229365 kernel: audit: type=1327 audit(1746837997.206:992): proctitle=737368643A20636F7265205B707269765D May 10 00:46:37.216000 audit[2758]: USER_START pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.233831 kernel: audit: type=1105 audit(1746837997.216:993): pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.233890 kernel: audit: type=1103 audit(1746837997.217:994): pid=2760 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.217000 audit[2760]: CRED_ACQ pid=2760 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.259163 kubelet[2056]: E0510 00:46:37.259123 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:37.372124 sshd[2758]: pam_unix(sshd:session): session closed for user core May 10 00:46:37.371000 audit[2758]: USER_END pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.374766 systemd-logind[1181]: Session 9 logged out. Waiting for processes to exit. May 10 00:46:37.376188 systemd[1]: sshd@8-10.0.0.118:22-10.0.0.1:42648.service: Deactivated successfully. May 10 00:46:37.378732 kernel: audit: type=1106 audit(1746837997.371:995): pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.376949 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:46:37.378471 systemd-logind[1181]: Removed session 9. May 10 00:46:37.371000 audit[2758]: CRED_DISP pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.382774 kernel: audit: type=1104 audit(1746837997.371:996): pid=2758 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.943411 env[1196]: time="2025-05-10T00:46:37.943359029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:37.950526 env[1196]: time="2025-05-10T00:46:37.950473509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:37.954369 env[1196]: time="2025-05-10T00:46:37.954337856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:37.956309 env[1196]: time="2025-05-10T00:46:37.956257060Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:37.956829 env[1196]: time="2025-05-10T00:46:37.956796592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:46:37.959739 env[1196]: time="2025-05-10T00:46:37.959694127Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:46:37.982178 env[1196]: time="2025-05-10T00:46:37.982096194Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\"" May 10 00:46:37.982729 env[1196]: time="2025-05-10T00:46:37.982690268Z" level=info msg="StartContainer for \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\"" May 10 00:46:38.006440 systemd[1]: run-containerd-runc-k8s.io-055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59-runc.x42C8W.mount: Deactivated successfully. May 10 00:46:38.008759 systemd[1]: Started cri-containerd-055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59.scope. May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fde4b460cb8 items=0 ppid=2568 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353632356236376462386165313639313362313964373733633238 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit: BPF prog-id=130 op=LOAD May 10 00:46:38.023000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000386e08 items=0 ppid=2568 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353632356236376462386165313639313362313964373733633238 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit: BPF prog-id=131 op=LOAD May 10 00:46:38.023000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000386e58 items=0 ppid=2568 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353632356236376462386165313639313362313964373733633238 May 10 00:46:38.023000 audit: BPF prog-id=131 op=UNLOAD May 10 00:46:38.023000 audit: BPF prog-id=130 op=UNLOAD May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:38.023000 audit: BPF prog-id=132 op=LOAD May 10 00:46:38.023000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000386ee8 items=0 ppid=2568 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353632356236376462386165313639313362313964373733633238 May 10 00:46:38.099560 env[1196]: time="2025-05-10T00:46:38.099500181Z" level=info msg="StartContainer for \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\" returns successfully" May 10 00:46:38.356143 kubelet[2056]: E0510 00:46:38.356113 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:39.258673 kubelet[2056]: E0510 00:46:39.258622 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:39.358453 kubelet[2056]: E0510 00:46:39.358409 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:39.831807 env[1196]: time="2025-05-10T00:46:39.831723360Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:46:39.833912 systemd[1]: cri-containerd-055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59.scope: Deactivated successfully. May 10 00:46:39.838000 audit: BPF prog-id=132 op=UNLOAD May 10 00:46:39.849650 kubelet[2056]: I0510 00:46:39.849622 2056 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:46:39.852502 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59-rootfs.mount: Deactivated successfully. May 10 00:46:40.218480 kubelet[2056]: I0510 00:46:40.218340 2056 topology_manager.go:215] "Topology Admit Handler" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" podNamespace="kube-system" podName="coredns-7db6d8ff4d-67xzr" May 10 00:46:40.223157 systemd[1]: Created slice kubepods-burstable-poda3d9b60d_7aa1_4633_8018_3b0a97709da2.slice. May 10 00:46:40.248576 kubelet[2056]: I0510 00:46:40.248529 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4splb\" (UniqueName: \"kubernetes.io/projected/a3d9b60d-7aa1-4633-8018-3b0a97709da2-kube-api-access-4splb\") pod \"coredns-7db6d8ff4d-67xzr\" (UID: \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\") " pod="kube-system/coredns-7db6d8ff4d-67xzr" May 10 00:46:40.248576 kubelet[2056]: I0510 00:46:40.248569 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a3d9b60d-7aa1-4633-8018-3b0a97709da2-config-volume\") pod \"coredns-7db6d8ff4d-67xzr\" (UID: \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\") " pod="kube-system/coredns-7db6d8ff4d-67xzr" May 10 00:46:40.257286 kubelet[2056]: I0510 00:46:40.257244 2056 topology_manager.go:215] "Topology Admit Handler" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" podNamespace="calico-apiserver" podName="calico-apiserver-568d49455f-7jch4" May 10 00:46:40.260204 kubelet[2056]: I0510 00:46:40.260188 2056 topology_manager.go:215] "Topology Admit Handler" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" podNamespace="calico-system" podName="calico-kube-controllers-5d67d94876-ngbtx" May 10 00:46:40.260477 kubelet[2056]: I0510 00:46:40.260462 2056 topology_manager.go:215] "Topology Admit Handler" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" podNamespace="calico-apiserver" podName="calico-apiserver-568d49455f-pwpxx" May 10 00:46:40.260868 kubelet[2056]: I0510 00:46:40.260827 2056 topology_manager.go:215] "Topology Admit Handler" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" podNamespace="kube-system" podName="coredns-7db6d8ff4d-vczlc" May 10 00:46:40.264569 systemd[1]: Created slice kubepods-besteffort-pod4302ba5e_ada9_449b_ab80_c3e958906fb4.slice. May 10 00:46:40.268998 systemd[1]: Created slice kubepods-besteffort-pod65a67f7d_1937_4f82_aa43_01aa3ce567af.slice. May 10 00:46:40.272614 systemd[1]: Created slice kubepods-besteffort-podda224529_209a_4c8a_9fe1_7dadb25d5795.slice. May 10 00:46:40.276043 systemd[1]: Created slice kubepods-burstable-podba49d75b_6d9b_4b78_a4a9_bbbecf477921.slice. May 10 00:46:40.306508 env[1196]: time="2025-05-10T00:46:40.306431779Z" level=info msg="shim disconnected" id=055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59 May 10 00:46:40.306508 env[1196]: time="2025-05-10T00:46:40.306501522Z" level=warning msg="cleaning up after shim disconnected" id=055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59 namespace=k8s.io May 10 00:46:40.306508 env[1196]: time="2025-05-10T00:46:40.306516901Z" level=info msg="cleaning up dead shim" May 10 00:46:40.317803 env[1196]: time="2025-05-10T00:46:40.317580387Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2820 runtime=io.containerd.runc.v2\n" May 10 00:46:40.349735 kubelet[2056]: I0510 00:46:40.349274 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/da224529-209a-4c8a-9fe1-7dadb25d5795-calico-apiserver-certs\") pod \"calico-apiserver-568d49455f-pwpxx\" (UID: \"da224529-209a-4c8a-9fe1-7dadb25d5795\") " pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" May 10 00:46:40.349735 kubelet[2056]: I0510 00:46:40.349331 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ba49d75b-6d9b-4b78-a4a9-bbbecf477921-config-volume\") pod \"coredns-7db6d8ff4d-vczlc\" (UID: \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\") " pod="kube-system/coredns-7db6d8ff4d-vczlc" May 10 00:46:40.349735 kubelet[2056]: I0510 00:46:40.349360 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n2p2r\" (UniqueName: \"kubernetes.io/projected/da224529-209a-4c8a-9fe1-7dadb25d5795-kube-api-access-n2p2r\") pod \"calico-apiserver-568d49455f-pwpxx\" (UID: \"da224529-209a-4c8a-9fe1-7dadb25d5795\") " pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" May 10 00:46:40.349735 kubelet[2056]: I0510 00:46:40.349408 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hj6rm\" (UniqueName: \"kubernetes.io/projected/4302ba5e-ada9-449b-ab80-c3e958906fb4-kube-api-access-hj6rm\") pod \"calico-apiserver-568d49455f-7jch4\" (UID: \"4302ba5e-ada9-449b-ab80-c3e958906fb4\") " pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" May 10 00:46:40.349735 kubelet[2056]: I0510 00:46:40.349432 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4302ba5e-ada9-449b-ab80-c3e958906fb4-calico-apiserver-certs\") pod \"calico-apiserver-568d49455f-7jch4\" (UID: \"4302ba5e-ada9-449b-ab80-c3e958906fb4\") " pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" May 10 00:46:40.350096 kubelet[2056]: I0510 00:46:40.349453 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2m6qc\" (UniqueName: \"kubernetes.io/projected/ba49d75b-6d9b-4b78-a4a9-bbbecf477921-kube-api-access-2m6qc\") pod \"coredns-7db6d8ff4d-vczlc\" (UID: \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\") " pod="kube-system/coredns-7db6d8ff4d-vczlc" May 10 00:46:40.350096 kubelet[2056]: I0510 00:46:40.349479 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/65a67f7d-1937-4f82-aa43-01aa3ce567af-tigera-ca-bundle\") pod \"calico-kube-controllers-5d67d94876-ngbtx\" (UID: \"65a67f7d-1937-4f82-aa43-01aa3ce567af\") " pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" May 10 00:46:40.350096 kubelet[2056]: I0510 00:46:40.349524 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5qfbj\" (UniqueName: \"kubernetes.io/projected/65a67f7d-1937-4f82-aa43-01aa3ce567af-kube-api-access-5qfbj\") pod \"calico-kube-controllers-5d67d94876-ngbtx\" (UID: \"65a67f7d-1937-4f82-aa43-01aa3ce567af\") " pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" May 10 00:46:40.366057 kubelet[2056]: E0510 00:46:40.361082 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:40.366376 env[1196]: time="2025-05-10T00:46:40.361935947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:46:40.526755 kubelet[2056]: E0510 00:46:40.525933 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:40.526903 env[1196]: time="2025-05-10T00:46:40.526786722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-67xzr,Uid:a3d9b60d-7aa1-4633-8018-3b0a97709da2,Namespace:kube-system,Attempt:0,}" May 10 00:46:40.567984 env[1196]: time="2025-05-10T00:46:40.567929588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-7jch4,Uid:4302ba5e-ada9-449b-ab80-c3e958906fb4,Namespace:calico-apiserver,Attempt:0,}" May 10 00:46:40.573543 env[1196]: time="2025-05-10T00:46:40.573501378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d67d94876-ngbtx,Uid:65a67f7d-1937-4f82-aa43-01aa3ce567af,Namespace:calico-system,Attempt:0,}" May 10 00:46:40.575145 env[1196]: time="2025-05-10T00:46:40.575117579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-pwpxx,Uid:da224529-209a-4c8a-9fe1-7dadb25d5795,Namespace:calico-apiserver,Attempt:0,}" May 10 00:46:40.578429 kubelet[2056]: E0510 00:46:40.578403 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:40.578749 env[1196]: time="2025-05-10T00:46:40.578722199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vczlc,Uid:ba49d75b-6d9b-4b78-a4a9-bbbecf477921,Namespace:kube-system,Attempt:0,}" May 10 00:46:40.610266 env[1196]: time="2025-05-10T00:46:40.610172461Z" level=error msg="Failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.610640 env[1196]: time="2025-05-10T00:46:40.610595146Z" level=error msg="encountered an error cleaning up failed sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.610696 env[1196]: time="2025-05-10T00:46:40.610660331Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-67xzr,Uid:a3d9b60d-7aa1-4633-8018-3b0a97709da2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.611022 kubelet[2056]: E0510 00:46:40.610964 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.611166 kubelet[2056]: E0510 00:46:40.611062 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-67xzr" May 10 00:46:40.611166 kubelet[2056]: E0510 00:46:40.611104 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-67xzr" May 10 00:46:40.611242 kubelet[2056]: E0510 00:46:40.611155 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-67xzr_kube-system(a3d9b60d-7aa1-4633-8018-3b0a97709da2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-67xzr_kube-system(a3d9b60d-7aa1-4633-8018-3b0a97709da2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-67xzr" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" May 10 00:46:40.684804 env[1196]: time="2025-05-10T00:46:40.684691461Z" level=error msg="Failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.685215 env[1196]: time="2025-05-10T00:46:40.685178558Z" level=error msg="encountered an error cleaning up failed sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.685288 env[1196]: time="2025-05-10T00:46:40.685246738Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-7jch4,Uid:4302ba5e-ada9-449b-ab80-c3e958906fb4,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.685585 kubelet[2056]: E0510 00:46:40.685543 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.685681 kubelet[2056]: E0510 00:46:40.685612 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" May 10 00:46:40.685681 kubelet[2056]: E0510 00:46:40.685638 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" May 10 00:46:40.686886 kubelet[2056]: E0510 00:46:40.686844 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-568d49455f-7jch4_calico-apiserver(4302ba5e-ada9-449b-ab80-c3e958906fb4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-568d49455f-7jch4_calico-apiserver(4302ba5e-ada9-449b-ab80-c3e958906fb4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" May 10 00:46:40.687016 env[1196]: time="2025-05-10T00:46:40.686972248Z" level=error msg="Failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.687329 env[1196]: time="2025-05-10T00:46:40.687292708Z" level=error msg="encountered an error cleaning up failed sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.687393 env[1196]: time="2025-05-10T00:46:40.687345368Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d67d94876-ngbtx,Uid:65a67f7d-1937-4f82-aa43-01aa3ce567af,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.687490 kubelet[2056]: E0510 00:46:40.687463 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.687569 kubelet[2056]: E0510 00:46:40.687501 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" May 10 00:46:40.687569 kubelet[2056]: E0510 00:46:40.687522 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" May 10 00:46:40.687569 kubelet[2056]: E0510 00:46:40.687553 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d67d94876-ngbtx_calico-system(65a67f7d-1937-4f82-aa43-01aa3ce567af)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d67d94876-ngbtx_calico-system(65a67f7d-1937-4f82-aa43-01aa3ce567af)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" May 10 00:46:40.689021 env[1196]: time="2025-05-10T00:46:40.688921382Z" level=error msg="Failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.689252 env[1196]: time="2025-05-10T00:46:40.689217286Z" level=error msg="encountered an error cleaning up failed sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.689307 env[1196]: time="2025-05-10T00:46:40.689263204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vczlc,Uid:ba49d75b-6d9b-4b78-a4a9-bbbecf477921,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.689558 kubelet[2056]: E0510 00:46:40.689397 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.689558 kubelet[2056]: E0510 00:46:40.689439 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-vczlc" May 10 00:46:40.689558 kubelet[2056]: E0510 00:46:40.689457 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-vczlc" May 10 00:46:40.689689 kubelet[2056]: E0510 00:46:40.689495 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-vczlc_kube-system(ba49d75b-6d9b-4b78-a4a9-bbbecf477921)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-vczlc_kube-system(ba49d75b-6d9b-4b78-a4a9-bbbecf477921)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vczlc" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" May 10 00:46:40.701483 env[1196]: time="2025-05-10T00:46:40.701412449Z" level=error msg="Failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.701820 env[1196]: time="2025-05-10T00:46:40.701780451Z" level=error msg="encountered an error cleaning up failed sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.701852 env[1196]: time="2025-05-10T00:46:40.701833222Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-pwpxx,Uid:da224529-209a-4c8a-9fe1-7dadb25d5795,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.702110 kubelet[2056]: E0510 00:46:40.702062 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:40.702178 kubelet[2056]: E0510 00:46:40.702129 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" May 10 00:46:40.702207 kubelet[2056]: E0510 00:46:40.702153 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" May 10 00:46:40.702261 kubelet[2056]: E0510 00:46:40.702229 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-568d49455f-pwpxx_calico-apiserver(da224529-209a-4c8a-9fe1-7dadb25d5795)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-568d49455f-pwpxx_calico-apiserver(da224529-209a-4c8a-9fe1-7dadb25d5795)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" May 10 00:46:41.263314 systemd[1]: Created slice kubepods-besteffort-podd85926ec_2929_465e_88c7_112e20f322a9.slice. May 10 00:46:41.265124 env[1196]: time="2025-05-10T00:46:41.265068546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6m6bf,Uid:d85926ec-2929-465e-88c7-112e20f322a9,Namespace:calico-system,Attempt:0,}" May 10 00:46:41.363756 kubelet[2056]: I0510 00:46:41.363721 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:46:41.364371 env[1196]: time="2025-05-10T00:46:41.364344069Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:46:41.364665 kubelet[2056]: I0510 00:46:41.364636 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:46:41.365113 env[1196]: time="2025-05-10T00:46:41.365069352Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:46:41.366021 kubelet[2056]: I0510 00:46:41.365696 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:46:41.366210 env[1196]: time="2025-05-10T00:46:41.366185398Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:46:41.367360 kubelet[2056]: I0510 00:46:41.367301 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:46:41.367785 env[1196]: time="2025-05-10T00:46:41.367735893Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:46:41.368428 kubelet[2056]: I0510 00:46:41.368409 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:46:41.368816 env[1196]: time="2025-05-10T00:46:41.368787467Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:46:41.404656 env[1196]: time="2025-05-10T00:46:41.404571795Z" level=error msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" failed" error="failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.404942 kubelet[2056]: E0510 00:46:41.404898 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:46:41.405011 kubelet[2056]: E0510 00:46:41.404963 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35"} May 10 00:46:41.405162 kubelet[2056]: E0510 00:46:41.405019 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:41.405162 kubelet[2056]: E0510 00:46:41.405043 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vczlc" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" May 10 00:46:41.410010 env[1196]: time="2025-05-10T00:46:41.409946146Z" level=error msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" failed" error="failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.410385 kubelet[2056]: E0510 00:46:41.410346 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:46:41.410445 kubelet[2056]: E0510 00:46:41.410387 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68"} May 10 00:46:41.410445 kubelet[2056]: E0510 00:46:41.410411 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:41.410445 kubelet[2056]: E0510 00:46:41.410430 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" May 10 00:46:41.419055 env[1196]: time="2025-05-10T00:46:41.418993536Z" level=error msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" failed" error="failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.419321 kubelet[2056]: E0510 00:46:41.419264 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:46:41.419384 kubelet[2056]: E0510 00:46:41.419330 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf"} May 10 00:46:41.419384 kubelet[2056]: E0510 00:46:41.419367 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:41.419480 kubelet[2056]: E0510 00:46:41.419391 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" May 10 00:46:41.420370 env[1196]: time="2025-05-10T00:46:41.420329953Z" level=error msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" failed" error="failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.421273 kubelet[2056]: E0510 00:46:41.420442 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:46:41.421273 kubelet[2056]: E0510 00:46:41.420537 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f"} May 10 00:46:41.421273 kubelet[2056]: E0510 00:46:41.420559 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:41.421273 kubelet[2056]: E0510 00:46:41.420576 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-67xzr" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" May 10 00:46:41.424068 env[1196]: time="2025-05-10T00:46:41.423996359Z" level=error msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" failed" error="failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.424225 kubelet[2056]: E0510 00:46:41.424185 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:46:41.424271 kubelet[2056]: E0510 00:46:41.424229 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727"} May 10 00:46:41.424271 kubelet[2056]: E0510 00:46:41.424250 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:41.424369 kubelet[2056]: E0510 00:46:41.424267 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" May 10 00:46:41.501420 env[1196]: time="2025-05-10T00:46:41.501352564Z" level=error msg="Failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.501756 env[1196]: time="2025-05-10T00:46:41.501731867Z" level=error msg="encountered an error cleaning up failed sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.501793 env[1196]: time="2025-05-10T00:46:41.501776782Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6m6bf,Uid:d85926ec-2929-465e-88c7-112e20f322a9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.502067 kubelet[2056]: E0510 00:46:41.502007 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:41.502151 kubelet[2056]: E0510 00:46:41.502088 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:41.502151 kubelet[2056]: E0510 00:46:41.502107 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6m6bf" May 10 00:46:41.502205 kubelet[2056]: E0510 00:46:41.502148 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6m6bf_calico-system(d85926ec-2929-465e-88c7-112e20f322a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6m6bf_calico-system(d85926ec-2929-465e-88c7-112e20f322a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:41.503401 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe-shm.mount: Deactivated successfully. May 10 00:46:42.370527 kubelet[2056]: I0510 00:46:42.370498 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:46:42.371225 env[1196]: time="2025-05-10T00:46:42.371178639Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:46:42.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:42652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.377091 systemd[1]: Started sshd@9-10.0.0.118:22-10.0.0.1:42652.service. May 10 00:46:42.383019 kernel: kauditd_printk_skb: 45 callbacks suppressed May 10 00:46:42.383101 kernel: audit: type=1130 audit(1746838002.376:1005): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:42652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.420000 audit[3209]: USER_ACCT pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.421349 sshd[3209]: Accepted publickey for core from 10.0.0.1 port 42652 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:42.433174 env[1196]: time="2025-05-10T00:46:42.433106469Z" level=error msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" failed" error="failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:42.433595 kubelet[2056]: E0510 00:46:42.433526 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:46:42.433687 kubelet[2056]: E0510 00:46:42.433616 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe"} May 10 00:46:42.433748 kubelet[2056]: E0510 00:46:42.433691 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:42.433848 kubelet[2056]: E0510 00:46:42.433745 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:42.436386 kernel: audit: type=1101 audit(1746838002.420:1006): pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.436456 kernel: audit: type=1103 audit(1746838002.434:1007): pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.434000 audit[3209]: CRED_ACQ pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.436362 sshd[3209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:42.440878 systemd-logind[1181]: New session 10 of user core. May 10 00:46:42.441758 systemd[1]: Started session-10.scope. May 10 00:46:42.472349 kernel: audit: type=1006 audit(1746838002.434:1008): pid=3209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:46:42.472453 kernel: audit: type=1300 audit(1746838002.434:1008): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde4ea9bf0 a2=3 a3=0 items=0 ppid=1 pid=3209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.434000 audit[3209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde4ea9bf0 a2=3 a3=0 items=0 ppid=1 pid=3209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.476860 kernel: audit: type=1327 audit(1746838002.434:1008): proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.478293 kernel: audit: type=1105 audit(1746838002.441:1009): pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.441000 audit[3209]: USER_START pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.483402 kernel: audit: type=1103 audit(1746838002.441:1010): pid=3222 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.441000 audit[3222]: CRED_ACQ pid=3222 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.605773 sshd[3209]: pam_unix(sshd:session): session closed for user core May 10 00:46:42.606000 audit[3209]: USER_END pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.608521 systemd[1]: sshd@9-10.0.0.118:22-10.0.0.1:42652.service: Deactivated successfully. May 10 00:46:42.609417 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:46:42.610397 systemd-logind[1181]: Session 10 logged out. Waiting for processes to exit. May 10 00:46:42.611211 systemd-logind[1181]: Removed session 10. May 10 00:46:42.606000 audit[3209]: CRED_DISP pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.625947 kernel: audit: type=1106 audit(1746838002.606:1011): pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.626138 kernel: audit: type=1104 audit(1746838002.606:1012): pid=3209 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:42652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.610824 systemd[1]: Started sshd@10-10.0.0.118:22-10.0.0.1:54034.service. May 10 00:46:47.611871 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:47.611966 kernel: audit: type=1130 audit(1746838007.610:1014): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.655000 audit[3236]: USER_ACCT pid=3236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.660000 audit[3236]: CRED_ACQ pid=3236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.661220 sshd[3236]: Accepted publickey for core from 10.0.0.1 port 54034 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:47.661464 sshd[3236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:47.661831 kernel: audit: type=1101 audit(1746838007.655:1015): pid=3236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.661879 kernel: audit: type=1103 audit(1746838007.660:1016): pid=3236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.675863 kernel: audit: type=1006 audit(1746838007.660:1017): pid=3236 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:46:47.675958 kernel: audit: type=1300 audit(1746838007.660:1017): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8430fd00 a2=3 a3=0 items=0 ppid=1 pid=3236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.660000 audit[3236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8430fd00 a2=3 a3=0 items=0 ppid=1 pid=3236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.670502 systemd-logind[1181]: New session 11 of user core. May 10 00:46:47.670821 systemd[1]: Started session-11.scope. May 10 00:46:47.677805 kernel: audit: type=1327 audit(1746838007.660:1017): proctitle=737368643A20636F7265205B707269765D May 10 00:46:47.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:47.674000 audit[3236]: USER_START pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.682237 kernel: audit: type=1105 audit(1746838007.674:1018): pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.682327 kernel: audit: type=1103 audit(1746838007.675:1019): pid=3238 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.675000 audit[3238]: CRED_ACQ pid=3238 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.790862 sshd[3236]: pam_unix(sshd:session): session closed for user core May 10 00:46:47.791000 audit[3236]: USER_END pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.793842 systemd[1]: sshd@10-10.0.0.118:22-10.0.0.1:54034.service: Deactivated successfully. May 10 00:46:47.794658 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:46:47.795398 systemd-logind[1181]: Session 11 logged out. Waiting for processes to exit. May 10 00:46:47.796304 systemd-logind[1181]: Removed session 11. May 10 00:46:47.791000 audit[3236]: CRED_DISP pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.801022 kernel: audit: type=1106 audit(1746838007.791:1020): pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.801144 kernel: audit: type=1104 audit(1746838007.791:1021): pid=3236 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:50.325244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1143572498.mount: Deactivated successfully. May 10 00:46:51.735388 env[1196]: time="2025-05-10T00:46:51.735324454Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.738442 env[1196]: time="2025-05-10T00:46:51.738395465Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.739893 env[1196]: time="2025-05-10T00:46:51.739859360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.741552 env[1196]: time="2025-05-10T00:46:51.741501423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:51.741898 env[1196]: time="2025-05-10T00:46:51.741842892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:46:51.756940 env[1196]: time="2025-05-10T00:46:51.756887838Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:51.783508 env[1196]: time="2025-05-10T00:46:51.783445073Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\"" May 10 00:46:51.784200 env[1196]: time="2025-05-10T00:46:51.784155605Z" level=info msg="StartContainer for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\"" May 10 00:46:51.802474 systemd[1]: Started cri-containerd-04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138.scope. May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f152006ec28 items=0 ppid=2568 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034653238666133653863383433333863353163366539376539343035 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit: BPF prog-id=133 op=LOAD May 10 00:46:51.821000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003bc338 items=0 ppid=2568 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034653238666133653863383433333863353163366539376539343035 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit: BPF prog-id=134 op=LOAD May 10 00:46:51.821000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003bc388 items=0 ppid=2568 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034653238666133653863383433333863353163366539376539343035 May 10 00:46:51.821000 audit: BPF prog-id=134 op=UNLOAD May 10 00:46:51.821000 audit: BPF prog-id=133 op=UNLOAD May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:51.821000 audit: BPF prog-id=135 op=LOAD May 10 00:46:51.821000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003bc418 items=0 ppid=2568 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034653238666133653863383433333863353163366539376539343035 May 10 00:46:51.846781 env[1196]: time="2025-05-10T00:46:51.846721409Z" level=info msg="StartContainer for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" returns successfully" May 10 00:46:51.909734 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:46:51.909883 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:46:51.955659 systemd[1]: cri-containerd-04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138.scope: Deactivated successfully. May 10 00:46:51.959000 audit: BPF prog-id=135 op=UNLOAD May 10 00:46:52.467984 kubelet[2056]: E0510 00:46:52.467929 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:52.521373 kubelet[2056]: I0510 00:46:52.521310 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zks2z" podStartSLOduration=2.449487378 podStartE2EDuration="32.521290259s" podCreationTimestamp="2025-05-10 00:46:20 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.670819063 +0000 UTC m=+21.516558340" lastFinishedPulling="2025-05-10 00:46:51.742621944 +0000 UTC m=+51.588361221" observedRunningTime="2025-05-10 00:46:52.520697021 +0000 UTC m=+52.366436299" watchObservedRunningTime="2025-05-10 00:46:52.521290259 +0000 UTC m=+52.367029536" May 10 00:46:52.725547 env[1196]: time="2025-05-10T00:46:52.725402588Z" level=info msg="shim disconnected" id=04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 May 10 00:46:52.725547 env[1196]: time="2025-05-10T00:46:52.725450448Z" level=warning msg="cleaning up after shim disconnected" id=04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 namespace=k8s.io May 10 00:46:52.725547 env[1196]: time="2025-05-10T00:46:52.725461400Z" level=info msg="cleaning up dead shim" May 10 00:46:52.725776 env[1196]: time="2025-05-10T00:46:52.725529640Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"9be44954a6cb56d7d9edf9e20a76ce0828511ada31468702690280493ffb1c09\": task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" May 10 00:46:52.726013 kubelet[2056]: E0510 00:46:52.725842 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"9be44954a6cb56d7d9edf9e20a76ce0828511ada31468702690280493ffb1c09\": task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:52.727264 env[1196]: time="2025-05-10T00:46:52.727216057Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" May 10 00:46:52.727364 kubelet[2056]: E0510 00:46:52.727333 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:52.728146 env[1196]: time="2025-05-10T00:46:52.728096692Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" May 10 00:46:52.728256 kubelet[2056]: E0510 00:46:52.728210 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138 not found: not found" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:52.732720 env[1196]: time="2025-05-10T00:46:52.732655872Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3314 runtime=io.containerd.runc.v2\n" May 10 00:46:52.747755 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138-rootfs.mount: Deactivated successfully. May 10 00:46:52.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:54044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:52.795859 systemd[1]: Started sshd@11-10.0.0.118:22-10.0.0.1:54044.service. May 10 00:46:52.797317 kernel: kauditd_printk_skb: 45 callbacks suppressed May 10 00:46:52.797394 kernel: audit: type=1130 audit(1746838012.795:1030): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:54044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:52.842000 audit[3327]: USER_ACCT pid=3327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.843411 sshd[3327]: Accepted publickey for core from 10.0.0.1 port 54044 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:52.846000 audit[3327]: CRED_ACQ pid=3327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.847941 sshd[3327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:52.851369 kernel: audit: type=1101 audit(1746838012.842:1031): pid=3327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.851466 kernel: audit: type=1103 audit(1746838012.846:1032): pid=3327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.851485 kernel: audit: type=1006 audit(1746838012.846:1033): pid=3327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 00:46:52.852752 systemd-logind[1181]: New session 12 of user core. May 10 00:46:52.853721 kernel: audit: type=1300 audit(1746838012.846:1033): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9700ba00 a2=3 a3=0 items=0 ppid=1 pid=3327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:52.846000 audit[3327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9700ba00 a2=3 a3=0 items=0 ppid=1 pid=3327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:52.853672 systemd[1]: Started session-12.scope. May 10 00:46:52.857697 kernel: audit: type=1327 audit(1746838012.846:1033): proctitle=737368643A20636F7265205B707269765D May 10 00:46:52.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:52.858000 audit[3327]: USER_START pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.863390 kernel: audit: type=1105 audit(1746838012.858:1034): pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.863447 kernel: audit: type=1103 audit(1746838012.859:1035): pid=3329 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.859000 audit[3329]: CRED_ACQ pid=3329 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.978770 sshd[3327]: pam_unix(sshd:session): session closed for user core May 10 00:46:52.979000 audit[3327]: USER_END pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.982917 systemd[1]: sshd@11-10.0.0.118:22-10.0.0.1:54044.service: Deactivated successfully. May 10 00:46:52.983631 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:46:52.986074 systemd[1]: Started sshd@12-10.0.0.118:22-10.0.0.1:54056.service. May 10 00:46:52.979000 audit[3327]: CRED_DISP pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.986518 systemd-logind[1181]: Session 12 logged out. Waiting for processes to exit. May 10 00:46:52.987958 systemd-logind[1181]: Removed session 12. May 10 00:46:52.990875 kernel: audit: type=1106 audit(1746838012.979:1036): pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.990997 kernel: audit: type=1104 audit(1746838012.979:1037): pid=3327 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:54044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:52.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:54056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.027000 audit[3341]: USER_ACCT pid=3341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.028577 sshd[3341]: Accepted publickey for core from 10.0.0.1 port 54056 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:53.028000 audit[3341]: CRED_ACQ pid=3341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.028000 audit[3341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea3b80a00 a2=3 a3=0 items=0 ppid=1 pid=3341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.029936 sshd[3341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:53.033772 systemd-logind[1181]: New session 13 of user core. May 10 00:46:53.034634 systemd[1]: Started session-13.scope. May 10 00:46:53.039000 audit[3341]: USER_START pid=3341 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.040000 audit[3343]: CRED_ACQ pid=3343 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.145103 env[1196]: time="2025-05-10T00:46:53.145025160Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="failed to exec in container: container is in CONTAINER_EXITED state" May 10 00:46:53.145566 kubelet[2056]: E0510 00:46:53.145266 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:53.145695 env[1196]: time="2025-05-10T00:46:53.145627615Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="failed to exec in container: container is in CONTAINER_EXITED state" May 10 00:46:53.145931 kubelet[2056]: E0510 00:46:53.145882 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:53.146169 env[1196]: time="2025-05-10T00:46:53.146104212Z" level=error msg="ExecSync for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" failed" error="failed to exec in container: container is in CONTAINER_EXITED state" May 10 00:46:53.146339 kubelet[2056]: E0510 00:46:53.146289 2056 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 00:46:53.259686 env[1196]: time="2025-05-10T00:46:53.259262684Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:46:53.259686 env[1196]: time="2025-05-10T00:46:53.259350891Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:46:53.259686 env[1196]: time="2025-05-10T00:46:53.259370158Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:46:53.260094 env[1196]: time="2025-05-10T00:46:53.260045983Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:46:53.283893 sshd[3341]: pam_unix(sshd:session): session closed for user core May 10 00:46:53.284000 audit[3341]: USER_END pid=3341 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.284000 audit[3341]: CRED_DISP pid=3341 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:54056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.286721 systemd[1]: sshd@12-10.0.0.118:22-10.0.0.1:54056.service: Deactivated successfully. May 10 00:46:53.287311 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:46:53.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:54058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.288918 systemd[1]: Started sshd@13-10.0.0.118:22-10.0.0.1:54058.service. May 10 00:46:53.290165 systemd-logind[1181]: Session 13 logged out. Waiting for processes to exit. May 10 00:46:53.291250 systemd-logind[1181]: Removed session 13. May 10 00:46:53.306143 env[1196]: time="2025-05-10T00:46:53.306037106Z" level=error msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" failed" error="failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:53.306392 kubelet[2056]: E0510 00:46:53.306350 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:46:53.306469 kubelet[2056]: E0510 00:46:53.306410 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68"} May 10 00:46:53.306469 kubelet[2056]: E0510 00:46:53.306449 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:53.306569 kubelet[2056]: E0510 00:46:53.306472 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" May 10 00:46:53.306802 env[1196]: time="2025-05-10T00:46:53.306769006Z" level=error msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" failed" error="failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:53.306862 env[1196]: time="2025-05-10T00:46:53.306807770Z" level=error msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" failed" error="failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:53.306929 kubelet[2056]: E0510 00:46:53.306905 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:46:53.306999 kubelet[2056]: E0510 00:46:53.306930 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727"} May 10 00:46:53.306999 kubelet[2056]: E0510 00:46:53.306954 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:53.306999 kubelet[2056]: E0510 00:46:53.306970 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" May 10 00:46:53.307849 kubelet[2056]: E0510 00:46:53.307819 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:46:53.307849 kubelet[2056]: E0510 00:46:53.307849 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f"} May 10 00:46:53.307965 kubelet[2056]: E0510 00:46:53.307871 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:53.307965 kubelet[2056]: E0510 00:46:53.307889 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-67xzr" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" May 10 00:46:53.317355 env[1196]: time="2025-05-10T00:46:53.317295363Z" level=error msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" failed" error="failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:53.317611 kubelet[2056]: E0510 00:46:53.317557 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:46:53.317734 kubelet[2056]: E0510 00:46:53.317608 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf"} May 10 00:46:53.317734 kubelet[2056]: E0510 00:46:53.317640 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:53.317734 kubelet[2056]: E0510 00:46:53.317676 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" May 10 00:46:53.327000 audit[3440]: USER_ACCT pid=3440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.328726 sshd[3440]: Accepted publickey for core from 10.0.0.1 port 54058 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:53.328000 audit[3440]: CRED_ACQ pid=3440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.328000 audit[3440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd43da0b80 a2=3 a3=0 items=0 ppid=1 pid=3440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.328000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.329980 sshd[3440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:53.334925 systemd-logind[1181]: New session 14 of user core. May 10 00:46:53.335238 systemd[1]: Started session-14.scope. May 10 00:46:53.339000 audit[3440]: USER_START pid=3440 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.340000 audit[3448]: CRED_ACQ pid=3448 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.470678 kubelet[2056]: I0510 00:46:53.470652 2056 scope.go:117] "RemoveContainer" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" May 10 00:46:53.471025 kubelet[2056]: E0510 00:46:53.470737 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:53.472808 env[1196]: time="2025-05-10T00:46:53.472776311Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 10 00:46:53.485191 sshd[3440]: pam_unix(sshd:session): session closed for user core May 10 00:46:53.485000 audit[3440]: USER_END pid=3440 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.485000 audit[3440]: CRED_DISP pid=3440 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.487896 systemd-logind[1181]: Session 14 logged out. Waiting for processes to exit. May 10 00:46:53.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:54058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.491449 systemd[1]: sshd@13-10.0.0.118:22-10.0.0.1:54058.service: Deactivated successfully. May 10 00:46:53.492189 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:46:53.493050 systemd-logind[1181]: Removed session 14. May 10 00:46:53.705678 env[1196]: time="2025-05-10T00:46:53.705608062Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece\"" May 10 00:46:53.706358 env[1196]: time="2025-05-10T00:46:53.706325716Z" level=info msg="StartContainer for \"75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece\"" May 10 00:46:53.723331 systemd[1]: Started cri-containerd-75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece.scope. May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8ce8d94098 items=0 ppid=2568 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303739643264646237663933366236396564306636393433386438 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit: BPF prog-id=136 op=LOAD May 10 00:46:53.737000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c60b8 items=0 ppid=2568 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303739643264646237663933366236396564306636393433386438 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit: BPF prog-id=137 op=LOAD May 10 00:46:53.737000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c6108 items=0 ppid=2568 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303739643264646237663933366236396564306636393433386438 May 10 00:46:53.737000 audit: BPF prog-id=137 op=UNLOAD May 10 00:46:53.737000 audit: BPF prog-id=136 op=UNLOAD May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.737000 audit: BPF prog-id=138 op=LOAD May 10 00:46:53.737000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c6198 items=0 ppid=2568 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303739643264646237663933366236396564306636393433386438 May 10 00:46:53.864329 env[1196]: time="2025-05-10T00:46:53.864243849Z" level=info msg="StartContainer for \"75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece\" returns successfully" May 10 00:46:53.877104 systemd[1]: cri-containerd-75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece.scope: Deactivated successfully. May 10 00:46:53.882000 audit: BPF prog-id=138 op=UNLOAD May 10 00:46:53.896605 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece-rootfs.mount: Deactivated successfully. May 10 00:46:54.015000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.015000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.015000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb79e0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:54.015000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00113d880 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:54.015000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:54.015000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:54.041811 env[1196]: time="2025-05-10T00:46:54.041730470Z" level=info msg="shim disconnected" id=75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece May 10 00:46:54.041811 env[1196]: time="2025-05-10T00:46:54.041790214Z" level=warning msg="cleaning up after shim disconnected" id=75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece namespace=k8s.io May 10 00:46:54.041811 env[1196]: time="2025-05-10T00:46:54.041806795Z" level=info msg="cleaning up dead shim" May 10 00:46:54.048637 env[1196]: time="2025-05-10T00:46:54.048579772Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3509 runtime=io.containerd.runc.v2\n" May 10 00:46:54.475430 kubelet[2056]: I0510 00:46:54.475397 2056 scope.go:117] "RemoveContainer" containerID="04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138" May 10 00:46:54.475878 kubelet[2056]: I0510 00:46:54.475693 2056 scope.go:117] "RemoveContainer" containerID="75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece" May 10 00:46:54.475878 kubelet[2056]: E0510 00:46:54.475766 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:54.477074 env[1196]: time="2025-05-10T00:46:54.477030518Z" level=info msg="RemoveContainer for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\"" May 10 00:46:54.487241 kubelet[2056]: E0510 00:46:54.487185 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-zks2z_calico-system(30648fc3-8d2b-45f3-8ce4-28fd3878a684)\"" pod="calico-system/calico-node-zks2z" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" May 10 00:46:54.546034 env[1196]: time="2025-05-10T00:46:54.545972113Z" level=info msg="RemoveContainer for \"04e28fa3e8c84338c51c6e97e9405173963708ef06d9ac1bf9305818d8754138\" returns successfully" May 10 00:46:54.883000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.883000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.883000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.883000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00f2bb920 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.883000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00f19f770 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:54.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:54.883000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a83b050 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:54.893000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.893000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a00ee20 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.893000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:54.894000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.894000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f19f800 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:54.894000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:54.894000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0098725c0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:46:54.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:55.259561 env[1196]: time="2025-05-10T00:46:55.259432301Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:46:55.284082 env[1196]: time="2025-05-10T00:46:55.284015453Z" level=error msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" failed" error="failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:55.284338 kubelet[2056]: E0510 00:46:55.284273 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:46:55.284406 kubelet[2056]: E0510 00:46:55.284330 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe"} May 10 00:46:55.284406 kubelet[2056]: E0510 00:46:55.284370 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:55.284406 kubelet[2056]: E0510 00:46:55.284395 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:46:55.480169 kubelet[2056]: I0510 00:46:55.480108 2056 scope.go:117] "RemoveContainer" containerID="75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece" May 10 00:46:55.480616 kubelet[2056]: E0510 00:46:55.480191 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:55.480616 kubelet[2056]: E0510 00:46:55.480590 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-zks2z_calico-system(30648fc3-8d2b-45f3-8ce4-28fd3878a684)\"" pod="calico-system/calico-node-zks2z" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" May 10 00:46:56.259850 env[1196]: time="2025-05-10T00:46:56.259797752Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:46:56.284711 env[1196]: time="2025-05-10T00:46:56.284612348Z" level=error msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" failed" error="failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:56.284987 kubelet[2056]: E0510 00:46:56.284927 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:46:56.285047 kubelet[2056]: E0510 00:46:56.284995 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35"} May 10 00:46:56.285047 kubelet[2056]: E0510 00:46:56.285031 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:56.285148 kubelet[2056]: E0510 00:46:56.285055 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vczlc" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" May 10 00:46:58.489483 systemd[1]: Started sshd@14-10.0.0.118:22-10.0.0.1:41898.service. May 10 00:46:58.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:41898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:58.491852 kernel: kauditd_printk_skb: 91 callbacks suppressed May 10 00:46:58.491926 kernel: audit: type=1130 audit(1746838018.488:1072): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:41898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:58.527000 audit[3569]: USER_ACCT pid=3569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.528603 sshd[3569]: Accepted publickey for core from 10.0.0.1 port 41898 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:46:58.530740 sshd[3569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:58.529000 audit[3569]: CRED_ACQ pid=3569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.534897 systemd-logind[1181]: New session 15 of user core. May 10 00:46:58.535732 systemd[1]: Started session-15.scope. May 10 00:46:58.536355 kernel: audit: type=1101 audit(1746838018.527:1073): pid=3569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.536399 kernel: audit: type=1103 audit(1746838018.529:1074): pid=3569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.536424 kernel: audit: type=1006 audit(1746838018.529:1075): pid=3569 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:46:58.529000 audit[3569]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9b098bd0 a2=3 a3=0 items=0 ppid=1 pid=3569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:58.549333 kernel: audit: type=1300 audit(1746838018.529:1075): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9b098bd0 a2=3 a3=0 items=0 ppid=1 pid=3569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:58.549524 kernel: audit: type=1327 audit(1746838018.529:1075): proctitle=737368643A20636F7265205B707269765D May 10 00:46:58.529000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:58.550875 kernel: audit: type=1105 audit(1746838018.539:1076): pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.539000 audit[3569]: USER_START pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.540000 audit[3571]: CRED_ACQ pid=3571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.558915 kernel: audit: type=1103 audit(1746838018.540:1077): pid=3571 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.647946 sshd[3569]: pam_unix(sshd:session): session closed for user core May 10 00:46:58.648000 audit[3569]: USER_END pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.650478 systemd[1]: sshd@14-10.0.0.118:22-10.0.0.1:41898.service: Deactivated successfully. May 10 00:46:58.651426 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:46:58.652228 systemd-logind[1181]: Session 15 logged out. Waiting for processes to exit. May 10 00:46:58.652959 systemd-logind[1181]: Removed session 15. May 10 00:46:58.648000 audit[3569]: CRED_DISP pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.659617 kernel: audit: type=1106 audit(1746838018.648:1078): pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.659678 kernel: audit: type=1104 audit(1746838018.648:1079): pid=3569 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:58.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:41898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:58.980000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:58.980000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023b6b80 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:58.980000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:58.981000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:58.981000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000375320 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:58.981000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e53960 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0003753a0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:46:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:03.653627 systemd[1]: Started sshd@15-10.0.0.118:22-10.0.0.1:41900.service. May 10 00:47:03.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:41900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:03.655115 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:47:03.655189 kernel: audit: type=1130 audit(1746838023.653:1085): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:41900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:03.694000 audit[3584]: USER_ACCT pid=3584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.695618 sshd[3584]: Accepted publickey for core from 10.0.0.1 port 41900 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:03.697593 sshd[3584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:03.696000 audit[3584]: CRED_ACQ pid=3584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.702317 systemd-logind[1181]: New session 16 of user core. May 10 00:47:03.703296 systemd[1]: Started session-16.scope. May 10 00:47:03.704622 kernel: audit: type=1101 audit(1746838023.694:1086): pid=3584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.704672 kernel: audit: type=1103 audit(1746838023.696:1087): pid=3584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.704694 kernel: audit: type=1006 audit(1746838023.696:1088): pid=3584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:47:03.707942 kernel: audit: type=1300 audit(1746838023.696:1088): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0b9060 a2=3 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.696000 audit[3584]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0b9060 a2=3 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:03.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:03.713445 kernel: audit: type=1327 audit(1746838023.696:1088): proctitle=737368643A20636F7265205B707269765D May 10 00:47:03.713477 kernel: audit: type=1105 audit(1746838023.708:1089): pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.708000 audit[3584]: USER_START pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.709000 audit[3586]: CRED_ACQ pid=3586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.721521 kernel: audit: type=1103 audit(1746838023.709:1090): pid=3586 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.816460 sshd[3584]: pam_unix(sshd:session): session closed for user core May 10 00:47:03.816000 audit[3584]: USER_END pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.818539 systemd[1]: sshd@15-10.0.0.118:22-10.0.0.1:41900.service: Deactivated successfully. May 10 00:47:03.819414 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:47:03.820221 systemd-logind[1181]: Session 16 logged out. Waiting for processes to exit. May 10 00:47:03.820977 systemd-logind[1181]: Removed session 16. May 10 00:47:03.816000 audit[3584]: CRED_DISP pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.826522 kernel: audit: type=1106 audit(1746838023.816:1091): pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.826578 kernel: audit: type=1104 audit(1746838023.816:1092): pid=3584 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:03.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:41900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:05.259529 env[1196]: time="2025-05-10T00:47:05.259472729Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:47:05.259994 env[1196]: time="2025-05-10T00:47:05.259893177Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:47:05.284922 env[1196]: time="2025-05-10T00:47:05.284845305Z" level=error msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" failed" error="failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:05.285208 kubelet[2056]: E0510 00:47:05.285150 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:05.285452 kubelet[2056]: E0510 00:47:05.285221 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68"} May 10 00:47:05.285452 kubelet[2056]: E0510 00:47:05.285264 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:05.285452 kubelet[2056]: E0510 00:47:05.285298 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" May 10 00:47:05.287554 env[1196]: time="2025-05-10T00:47:05.287515015Z" level=error msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" failed" error="failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:05.287737 kubelet[2056]: E0510 00:47:05.287672 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:05.287802 kubelet[2056]: E0510 00:47:05.287751 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727"} May 10 00:47:05.287802 kubelet[2056]: E0510 00:47:05.287785 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:05.287909 kubelet[2056]: E0510 00:47:05.287808 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" May 10 00:47:06.259550 env[1196]: time="2025-05-10T00:47:06.259493275Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:47:06.284210 env[1196]: time="2025-05-10T00:47:06.284131623Z" level=error msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" failed" error="failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:06.284484 kubelet[2056]: E0510 00:47:06.284431 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:06.284562 kubelet[2056]: E0510 00:47:06.284495 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe"} May 10 00:47:06.284562 kubelet[2056]: E0510 00:47:06.284537 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:06.284673 kubelet[2056]: E0510 00:47:06.284573 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:47:07.259008 env[1196]: time="2025-05-10T00:47:07.258956300Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:47:07.282066 env[1196]: time="2025-05-10T00:47:07.281982763Z" level=error msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" failed" error="failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:07.282435 kubelet[2056]: E0510 00:47:07.282278 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:07.282435 kubelet[2056]: E0510 00:47:07.282336 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf"} May 10 00:47:07.282435 kubelet[2056]: E0510 00:47:07.282374 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:07.282435 kubelet[2056]: E0510 00:47:07.282402 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" May 10 00:47:08.258761 kubelet[2056]: I0510 00:47:08.258692 2056 scope.go:117] "RemoveContainer" containerID="75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece" May 10 00:47:08.258975 kubelet[2056]: E0510 00:47:08.258792 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:08.259690 env[1196]: time="2025-05-10T00:47:08.259644221Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:47:08.259933 env[1196]: time="2025-05-10T00:47:08.259893946Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:47:08.263332 env[1196]: time="2025-05-10T00:47:08.262862070Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 10 00:47:08.288111 env[1196]: time="2025-05-10T00:47:08.287947737Z" level=error msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" failed" error="failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:08.288522 kubelet[2056]: E0510 00:47:08.288318 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:08.288522 kubelet[2056]: E0510 00:47:08.288376 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f"} May 10 00:47:08.288522 kubelet[2056]: E0510 00:47:08.288416 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:08.288522 kubelet[2056]: E0510 00:47:08.288484 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-67xzr" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" May 10 00:47:08.291183 env[1196]: time="2025-05-10T00:47:08.291084872Z" level=error msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" failed" error="failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:08.291359 kubelet[2056]: E0510 00:47:08.291309 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:08.291359 kubelet[2056]: E0510 00:47:08.291344 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35"} May 10 00:47:08.291459 kubelet[2056]: E0510 00:47:08.291366 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:08.291459 kubelet[2056]: E0510 00:47:08.291386 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vczlc" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" May 10 00:47:08.575482 env[1196]: time="2025-05-10T00:47:08.575432897Z" level=info msg="CreateContainer within sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\"" May 10 00:47:08.576125 env[1196]: time="2025-05-10T00:47:08.576086258Z" level=info msg="StartContainer for \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\"" May 10 00:47:08.595868 systemd[1]: run-containerd-runc-k8s.io-757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd-runc.KOzkli.mount: Deactivated successfully. May 10 00:47:08.597515 systemd[1]: Started cri-containerd-757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd.scope. May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f29e59efc68 items=0 ppid=2568 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376631343438613930316631613763383764396239616634613232 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit: BPF prog-id=139 op=LOAD May 10 00:47:08.610000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f22c8 items=0 ppid=2568 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376631343438613930316631613763383764396239616634613232 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit: BPF prog-id=140 op=LOAD May 10 00:47:08.610000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003f2318 items=0 ppid=2568 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376631343438613930316631613763383764396239616634613232 May 10 00:47:08.610000 audit: BPF prog-id=140 op=UNLOAD May 10 00:47:08.610000 audit: BPF prog-id=139 op=UNLOAD May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:08.610000 audit: BPF prog-id=141 op=LOAD May 10 00:47:08.610000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003f23a8 items=0 ppid=2568 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376631343438613930316631613763383764396239616634613232 May 10 00:47:08.624365 env[1196]: time="2025-05-10T00:47:08.624318603Z" level=info msg="StartContainer for \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\" returns successfully" May 10 00:47:08.672817 systemd[1]: cri-containerd-757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd.scope: Deactivated successfully. May 10 00:47:08.675000 audit: BPF prog-id=141 op=UNLOAD May 10 00:47:08.678020 kernel: kauditd_printk_skb: 44 callbacks suppressed May 10 00:47:08.678075 kernel: audit: type=1334 audit(1746838028.675:1100): prog-id=141 op=UNLOAD May 10 00:47:08.704055 env[1196]: time="2025-05-10T00:47:08.703970429Z" level=info msg="shim disconnected" id=757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd May 10 00:47:08.704055 env[1196]: time="2025-05-10T00:47:08.704037716Z" level=warning msg="cleaning up after shim disconnected" id=757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd namespace=k8s.io May 10 00:47:08.704055 env[1196]: time="2025-05-10T00:47:08.704053217Z" level=info msg="cleaning up dead shim" May 10 00:47:08.711622 env[1196]: time="2025-05-10T00:47:08.711568832Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:47:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3784 runtime=io.containerd.runc.v2\n" May 10 00:47:08.822492 systemd[1]: Started sshd@16-10.0.0.118:22-10.0.0.1:52046.service. May 10 00:47:08.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:52046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:08.826725 kernel: audit: type=1130 audit(1746838028.820:1101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:52046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:08.860000 audit[3797]: USER_ACCT pid=3797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.862243 sshd[3797]: Accepted publickey for core from 10.0.0.1 port 52046 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:08.865344 sshd[3797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:08.863000 audit[3797]: CRED_ACQ pid=3797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.869921 systemd-logind[1181]: New session 17 of user core. May 10 00:47:08.870988 kernel: audit: type=1101 audit(1746838028.860:1102): pid=3797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.871049 kernel: audit: type=1103 audit(1746838028.863:1103): pid=3797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.871078 kernel: audit: type=1006 audit(1746838028.863:1104): pid=3797 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:47:08.870883 systemd[1]: Started session-17.scope. May 10 00:47:08.873578 kernel: audit: type=1300 audit(1746838028.863:1104): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b847820 a2=3 a3=0 items=0 ppid=1 pid=3797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.863000 audit[3797]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b847820 a2=3 a3=0 items=0 ppid=1 pid=3797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.877781 kernel: audit: type=1327 audit(1746838028.863:1104): proctitle=737368643A20636F7265205B707269765D May 10 00:47:08.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:08.879199 kernel: audit: type=1105 audit(1746838028.874:1105): pid=3797 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.874000 audit[3797]: USER_START pid=3797 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.883676 kernel: audit: type=1103 audit(1746838028.876:1106): pid=3799 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.876000 audit[3799]: CRED_ACQ pid=3799 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.996227 sshd[3797]: pam_unix(sshd:session): session closed for user core May 10 00:47:08.995000 audit[3797]: USER_END pid=3797 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.995000 audit[3797]: CRED_DISP pid=3797 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:52046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:09.002751 kernel: audit: type=1106 audit(1746838028.995:1107): pid=3797 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:08.998492 systemd[1]: sshd@16-10.0.0.118:22-10.0.0.1:52046.service: Deactivated successfully. May 10 00:47:08.999361 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:47:09.000143 systemd-logind[1181]: Session 17 logged out. Waiting for processes to exit. May 10 00:47:09.000943 systemd-logind[1181]: Removed session 17. May 10 00:47:09.477464 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd-rootfs.mount: Deactivated successfully. May 10 00:47:09.511484 kubelet[2056]: I0510 00:47:09.511452 2056 scope.go:117] "RemoveContainer" containerID="75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece" May 10 00:47:09.511929 kubelet[2056]: I0510 00:47:09.511883 2056 scope.go:117] "RemoveContainer" containerID="757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd" May 10 00:47:09.511970 kubelet[2056]: E0510 00:47:09.511954 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:09.512358 kubelet[2056]: E0510 00:47:09.512332 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-zks2z_calico-system(30648fc3-8d2b-45f3-8ce4-28fd3878a684)\"" pod="calico-system/calico-node-zks2z" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" May 10 00:47:09.512480 env[1196]: time="2025-05-10T00:47:09.512440915Z" level=info msg="RemoveContainer for \"75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece\"" May 10 00:47:09.516359 env[1196]: time="2025-05-10T00:47:09.516328213Z" level=info msg="RemoveContainer for \"75079d2ddb7f936b69ed0f69438d85b1c35884ebe867cb9aea2e4e29ce8d2ece\" returns successfully" May 10 00:47:12.377613 kubelet[2056]: I0510 00:47:12.377568 2056 scope.go:117] "RemoveContainer" containerID="757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd" May 10 00:47:12.378106 kubelet[2056]: E0510 00:47:12.377652 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:12.378106 kubelet[2056]: E0510 00:47:12.378046 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-zks2z_calico-system(30648fc3-8d2b-45f3-8ce4-28fd3878a684)\"" pod="calico-system/calico-node-zks2z" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" May 10 00:47:14.001368 systemd[1]: Started sshd@17-10.0.0.118:22-10.0.0.1:52048.service. May 10 00:47:13.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:52048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:14.003351 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 00:47:14.003421 kernel: audit: type=1130 audit(1746838033.999:1110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:52048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:14.039000 audit[3810]: USER_ACCT pid=3810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.040960 sshd[3810]: Accepted publickey for core from 10.0.0.1 port 52048 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:14.042579 sshd[3810]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:14.040000 audit[3810]: CRED_ACQ pid=3810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.080755 systemd-logind[1181]: New session 18 of user core. May 10 00:47:14.082218 systemd[1]: Started session-18.scope. May 10 00:47:14.084680 kernel: audit: type=1101 audit(1746838034.039:1111): pid=3810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.084778 kernel: audit: type=1103 audit(1746838034.040:1112): pid=3810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.084814 kernel: audit: type=1006 audit(1746838034.040:1113): pid=3810 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:47:14.040000 audit[3810]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff1815e0 a2=3 a3=0 items=0 ppid=1 pid=3810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.091284 kernel: audit: type=1300 audit(1746838034.040:1113): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff1815e0 a2=3 a3=0 items=0 ppid=1 pid=3810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.091351 kernel: audit: type=1327 audit(1746838034.040:1113): proctitle=737368643A20636F7265205B707269765D May 10 00:47:14.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:14.092651 kernel: audit: type=1105 audit(1746838034.085:1114): pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.085000 audit[3810]: USER_START pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.087000 audit[3812]: CRED_ACQ pid=3812 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.143991 kernel: audit: type=1103 audit(1746838034.087:1115): pid=3812 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.206487 sshd[3810]: pam_unix(sshd:session): session closed for user core May 10 00:47:14.205000 audit[3810]: USER_END pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.209038 systemd[1]: sshd@17-10.0.0.118:22-10.0.0.1:52048.service: Deactivated successfully. May 10 00:47:14.209913 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:47:14.210753 systemd-logind[1181]: Session 18 logged out. Waiting for processes to exit. May 10 00:47:14.211855 systemd-logind[1181]: Removed session 18. May 10 00:47:14.205000 audit[3810]: CRED_DISP pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.223089 kernel: audit: type=1106 audit(1746838034.205:1116): pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.223154 kernel: audit: type=1104 audit(1746838034.205:1117): pid=3810 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:14.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:52048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:17.259239 kubelet[2056]: E0510 00:47:17.259205 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:17.259663 env[1196]: time="2025-05-10T00:47:17.259414161Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:47:17.282246 env[1196]: time="2025-05-10T00:47:17.282170297Z" level=error msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" failed" error="failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:17.282531 kubelet[2056]: E0510 00:47:17.282461 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:17.282603 kubelet[2056]: E0510 00:47:17.282537 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68"} May 10 00:47:17.282603 kubelet[2056]: E0510 00:47:17.282585 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:17.282732 kubelet[2056]: E0510 00:47:17.282615 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4302ba5e-ada9-449b-ab80-c3e958906fb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podUID="4302ba5e-ada9-449b-ab80-c3e958906fb4" May 10 00:47:19.211108 systemd[1]: Started sshd@18-10.0.0.118:22-10.0.0.1:49916.service. May 10 00:47:19.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:19.212189 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:19.212227 kernel: audit: type=1130 audit(1746838039.209:1119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:19.247000 audit[3848]: USER_ACCT pid=3848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.249221 sshd[3848]: Accepted publickey for core from 10.0.0.1 port 49916 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:19.251000 audit[3848]: CRED_ACQ pid=3848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.253128 sshd[3848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:19.256521 kernel: audit: type=1101 audit(1746838039.247:1120): pid=3848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.256578 kernel: audit: type=1103 audit(1746838039.251:1121): pid=3848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.256597 kernel: audit: type=1006 audit(1746838039.251:1122): pid=3848 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 10 00:47:19.256955 systemd-logind[1181]: New session 19 of user core. May 10 00:47:19.257717 systemd[1]: Started session-19.scope. May 10 00:47:19.258726 kubelet[2056]: E0510 00:47:19.258676 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:19.258949 kernel: audit: type=1300 audit(1746838039.251:1122): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff47d25090 a2=3 a3=0 items=0 ppid=1 pid=3848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:19.251000 audit[3848]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff47d25090 a2=3 a3=0 items=0 ppid=1 pid=3848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:19.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:19.261000 audit[3848]: USER_START pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.269954 kernel: audit: type=1327 audit(1746838039.251:1122): proctitle=737368643A20636F7265205B707269765D May 10 00:47:19.270066 kernel: audit: type=1105 audit(1746838039.261:1123): pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.270122 kernel: audit: type=1103 audit(1746838039.262:1124): pid=3850 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.262000 audit[3850]: CRED_ACQ pid=3850 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.387469 sshd[3848]: pam_unix(sshd:session): session closed for user core May 10 00:47:19.386000 audit[3848]: USER_END pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.389934 systemd[1]: sshd@18-10.0.0.118:22-10.0.0.1:49916.service: Deactivated successfully. May 10 00:47:19.390612 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:47:19.391484 systemd-logind[1181]: Session 19 logged out. Waiting for processes to exit. May 10 00:47:19.392167 systemd-logind[1181]: Removed session 19. May 10 00:47:19.386000 audit[3848]: CRED_DISP pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.403801 kernel: audit: type=1106 audit(1746838039.386:1125): pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.403861 kernel: audit: type=1104 audit(1746838039.386:1126): pid=3848 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:19.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:20.258863 env[1196]: time="2025-05-10T00:47:20.258823660Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:47:20.259771 env[1196]: time="2025-05-10T00:47:20.259751190Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:47:20.260137 env[1196]: time="2025-05-10T00:47:20.260070836Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:47:20.260727 env[1196]: time="2025-05-10T00:47:20.260090153Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:47:20.297195 env[1196]: time="2025-05-10T00:47:20.297118988Z" level=error msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" failed" error="failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:20.297728 kubelet[2056]: E0510 00:47:20.297663 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:20.298045 kubelet[2056]: E0510 00:47:20.297726 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35"} May 10 00:47:20.298045 kubelet[2056]: E0510 00:47:20.297761 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:20.298045 kubelet[2056]: E0510 00:47:20.297782 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba49d75b-6d9b-4b78-a4a9-bbbecf477921\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vczlc" podUID="ba49d75b-6d9b-4b78-a4a9-bbbecf477921" May 10 00:47:20.306308 env[1196]: time="2025-05-10T00:47:20.306242190Z" level=error msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" failed" error="failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:20.306568 kubelet[2056]: E0510 00:47:20.306527 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:20.306641 kubelet[2056]: E0510 00:47:20.306581 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727"} May 10 00:47:20.306641 kubelet[2056]: E0510 00:47:20.306604 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:20.306641 kubelet[2056]: E0510 00:47:20.306622 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65a67f7d-1937-4f82-aa43-01aa3ce567af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podUID="65a67f7d-1937-4f82-aa43-01aa3ce567af" May 10 00:47:20.308472 env[1196]: time="2025-05-10T00:47:20.308436261Z" level=error msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" failed" error="failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:20.308782 kubelet[2056]: E0510 00:47:20.308737 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:20.308849 kubelet[2056]: E0510 00:47:20.308805 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe"} May 10 00:47:20.308890 kubelet[2056]: E0510 00:47:20.308864 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:20.308957 kubelet[2056]: E0510 00:47:20.308898 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d85926ec-2929-465e-88c7-112e20f322a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6m6bf" podUID="d85926ec-2929-465e-88c7-112e20f322a9" May 10 00:47:20.311013 env[1196]: time="2025-05-10T00:47:20.310936623Z" level=error msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" failed" error="failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:20.311195 kubelet[2056]: E0510 00:47:20.311151 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:20.311275 kubelet[2056]: E0510 00:47:20.311221 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf"} May 10 00:47:20.311275 kubelet[2056]: E0510 00:47:20.311247 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:20.311275 kubelet[2056]: E0510 00:47:20.311264 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da224529-209a-4c8a-9fe1-7dadb25d5795\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podUID="da224529-209a-4c8a-9fe1-7dadb25d5795" May 10 00:47:21.259211 kubelet[2056]: E0510 00:47:21.259157 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:22.206085 env[1196]: time="2025-05-10T00:47:22.206045190Z" level=info msg="StopPodSandbox for \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\"" May 10 00:47:22.206492 env[1196]: time="2025-05-10T00:47:22.206115845Z" level=info msg="Container to stop \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:47:22.206492 env[1196]: time="2025-05-10T00:47:22.206129701Z" level=info msg="Container to stop \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:47:22.206492 env[1196]: time="2025-05-10T00:47:22.206139640Z" level=info msg="Container to stop \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:47:22.208975 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01-shm.mount: Deactivated successfully. May 10 00:47:22.215723 systemd[1]: cri-containerd-79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01.scope: Deactivated successfully. May 10 00:47:22.215000 audit: BPF prog-id=119 op=UNLOAD May 10 00:47:22.220000 audit: BPF prog-id=122 op=UNLOAD May 10 00:47:22.238929 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01-rootfs.mount: Deactivated successfully. May 10 00:47:22.385084 env[1196]: time="2025-05-10T00:47:22.385004809Z" level=info msg="shim disconnected" id=79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01 May 10 00:47:22.385084 env[1196]: time="2025-05-10T00:47:22.385061817Z" level=warning msg="cleaning up after shim disconnected" id=79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01 namespace=k8s.io May 10 00:47:22.385084 env[1196]: time="2025-05-10T00:47:22.385072066Z" level=info msg="cleaning up dead shim" May 10 00:47:22.392188 env[1196]: time="2025-05-10T00:47:22.392125261Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:47:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3974 runtime=io.containerd.runc.v2\n" May 10 00:47:22.392522 env[1196]: time="2025-05-10T00:47:22.392481637Z" level=info msg="TearDown network for sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" successfully" May 10 00:47:22.392522 env[1196]: time="2025-05-10T00:47:22.392513538Z" level=info msg="StopPodSandbox for \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" returns successfully" May 10 00:47:22.425085 kubelet[2056]: I0510 00:47:22.425037 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-flexvol-driver-host\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425085 kubelet[2056]: I0510 00:47:22.425076 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-lib-calico\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425085 kubelet[2056]: I0510 00:47:22.425096 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-lib-modules\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425120 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-policysync\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425140 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/30648fc3-8d2b-45f3-8ce4-28fd3878a684-node-certs\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425164 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30648fc3-8d2b-45f3-8ce4-28fd3878a684-tigera-ca-bundle\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425175 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425190 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-run-calico\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425675 kubelet[2056]: I0510 00:47:22.425210 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-net-dir\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425226 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ftk2f\" (UniqueName: \"kubernetes.io/projected/30648fc3-8d2b-45f3-8ce4-28fd3878a684-kube-api-access-ftk2f\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425240 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-bin-dir\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425264 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-xtables-lock\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425282 2056 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-log-dir\") pod \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\" (UID: \"30648fc3-8d2b-45f3-8ce4-28fd3878a684\") " May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425349 2056 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.425939 kubelet[2056]: I0510 00:47:22.425389 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426156 kubelet[2056]: I0510 00:47:22.425502 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426156 kubelet[2056]: I0510 00:47:22.425574 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426156 kubelet[2056]: I0510 00:47:22.425611 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-policysync" (OuterVolumeSpecName: "policysync") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426156 kubelet[2056]: I0510 00:47:22.425647 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426156 kubelet[2056]: I0510 00:47:22.425687 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426335 kubelet[2056]: I0510 00:47:22.425807 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.426335 kubelet[2056]: I0510 00:47:22.425827 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:47:22.428460 kubelet[2056]: I0510 00:47:22.428390 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/30648fc3-8d2b-45f3-8ce4-28fd3878a684-kube-api-access-ftk2f" (OuterVolumeSpecName: "kube-api-access-ftk2f") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "kube-api-access-ftk2f". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:47:22.429647 kubelet[2056]: I0510 00:47:22.429601 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/30648fc3-8d2b-45f3-8ce4-28fd3878a684-node-certs" (OuterVolumeSpecName: "node-certs") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:47:22.430631 systemd[1]: var-lib-kubelet-pods-30648fc3\x2d8d2b\x2d45f3\x2d8ce4\x2d28fd3878a684-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dftk2f.mount: Deactivated successfully. May 10 00:47:22.433617 systemd[1]: var-lib-kubelet-pods-30648fc3\x2d8d2b\x2d45f3\x2d8ce4\x2d28fd3878a684-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:47:22.434552 kubelet[2056]: I0510 00:47:22.434523 2056 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/30648fc3-8d2b-45f3-8ce4-28fd3878a684-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "30648fc3-8d2b-45f3-8ce4-28fd3878a684" (UID: "30648fc3-8d2b-45f3-8ce4-28fd3878a684"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:47:22.436345 systemd[1]: var-lib-kubelet-pods-30648fc3\x2d8d2b\x2d45f3\x2d8ce4\x2d28fd3878a684-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526073 2056 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-lib-modules\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526132 2056 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-policysync\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526180 2056 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/30648fc3-8d2b-45f3-8ce4-28fd3878a684-node-certs\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526197 2056 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526213 2056 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30648fc3-8d2b-45f3-8ce4-28fd3878a684-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526217 kubelet[2056]: I0510 00:47:22.526223 2056 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526508 kubelet[2056]: I0510 00:47:22.526233 2056 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526508 kubelet[2056]: I0510 00:47:22.526245 2056 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-ftk2f\" (UniqueName: \"kubernetes.io/projected/30648fc3-8d2b-45f3-8ce4-28fd3878a684-kube-api-access-ftk2f\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526508 kubelet[2056]: I0510 00:47:22.526256 2056 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526508 kubelet[2056]: I0510 00:47:22.526266 2056 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.526508 kubelet[2056]: I0510 00:47:22.526276 2056 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/30648fc3-8d2b-45f3-8ce4-28fd3878a684-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 10 00:47:22.542862 kubelet[2056]: I0510 00:47:22.542832 2056 scope.go:117] "RemoveContainer" containerID="757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd" May 10 00:47:22.543814 env[1196]: time="2025-05-10T00:47:22.543786293Z" level=info msg="RemoveContainer for \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\"" May 10 00:47:22.546190 systemd[1]: Removed slice kubepods-besteffort-pod30648fc3_8d2b_45f3_8ce4_28fd3878a684.slice. May 10 00:47:22.622399 env[1196]: time="2025-05-10T00:47:22.622329924Z" level=info msg="RemoveContainer for \"757f1448a901f1a7c87d9b9af4a22c4d25bfb494536bff3a77c7cb7de230eecd\" returns successfully" May 10 00:47:22.622725 kubelet[2056]: I0510 00:47:22.622654 2056 scope.go:117] "RemoveContainer" containerID="055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59" May 10 00:47:22.624372 env[1196]: time="2025-05-10T00:47:22.624333964Z" level=info msg="RemoveContainer for \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\"" May 10 00:47:22.653062 env[1196]: time="2025-05-10T00:47:22.653008720Z" level=info msg="RemoveContainer for \"055625b67db8ae16913b19d773c286eb59c98f4468bc97c0ecaef682718ebd59\" returns successfully" May 10 00:47:22.653359 kubelet[2056]: I0510 00:47:22.653325 2056 scope.go:117] "RemoveContainer" containerID="c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7" May 10 00:47:22.655315 env[1196]: time="2025-05-10T00:47:22.655248126Z" level=info msg="RemoveContainer for \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\"" May 10 00:47:22.691220 env[1196]: time="2025-05-10T00:47:22.691161979Z" level=info msg="RemoveContainer for \"c11868bd9ce7a1fa5df41749d87cbeeba959c397456b6d293d15815018287da7\" returns successfully" May 10 00:47:22.717978 kubelet[2056]: I0510 00:47:22.717910 2056 topology_manager.go:215] "Topology Admit Handler" podUID="99a93dc5-8b5a-4079-850b-1c00e3f4f5e1" podNamespace="calico-system" podName="calico-node-ztgjm" May 10 00:47:22.717978 kubelet[2056]: E0510 00:47:22.717986 2056 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="flexvol-driver" May 10 00:47:22.718338 kubelet[2056]: E0510 00:47:22.717997 2056 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="install-cni" May 10 00:47:22.718338 kubelet[2056]: E0510 00:47:22.718003 2056 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.718338 kubelet[2056]: E0510 00:47:22.718008 2056 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.718338 kubelet[2056]: E0510 00:47:22.718013 2056 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.718338 kubelet[2056]: I0510 00:47:22.718041 2056 memory_manager.go:354] "RemoveStaleState removing state" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.718338 kubelet[2056]: I0510 00:47:22.718049 2056 memory_manager.go:354] "RemoveStaleState removing state" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.718338 kubelet[2056]: I0510 00:47:22.718082 2056 memory_manager.go:354] "RemoveStaleState removing state" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" containerName="calico-node" May 10 00:47:22.724164 systemd[1]: Created slice kubepods-besteffort-pod99a93dc5_8b5a_4079_850b_1c00e3f4f5e1.slice. May 10 00:47:22.828600 kubelet[2056]: I0510 00:47:22.828539 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-xtables-lock\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828600 kubelet[2056]: I0510 00:47:22.828587 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-policysync\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828600 kubelet[2056]: I0510 00:47:22.828614 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-tigera-ca-bundle\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828905 kubelet[2056]: I0510 00:47:22.828649 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-flexvol-driver-host\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828905 kubelet[2056]: I0510 00:47:22.828687 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-var-run-calico\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828905 kubelet[2056]: I0510 00:47:22.828742 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-node-certs\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828905 kubelet[2056]: I0510 00:47:22.828763 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-var-lib-calico\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.828905 kubelet[2056]: I0510 00:47:22.828779 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-cni-net-dir\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.829069 kubelet[2056]: I0510 00:47:22.828791 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-cni-log-dir\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.829069 kubelet[2056]: I0510 00:47:22.828806 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-86grk\" (UniqueName: \"kubernetes.io/projected/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-kube-api-access-86grk\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.829069 kubelet[2056]: I0510 00:47:22.828823 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-lib-modules\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:22.829069 kubelet[2056]: I0510 00:47:22.828837 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/99a93dc5-8b5a-4079-850b-1c00e3f4f5e1-cni-bin-dir\") pod \"calico-node-ztgjm\" (UID: \"99a93dc5-8b5a-4079-850b-1c00e3f4f5e1\") " pod="calico-system/calico-node-ztgjm" May 10 00:47:23.028921 kubelet[2056]: E0510 00:47:23.028874 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:23.029484 env[1196]: time="2025-05-10T00:47:23.029424898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ztgjm,Uid:99a93dc5-8b5a-4079-850b-1c00e3f4f5e1,Namespace:calico-system,Attempt:0,}" May 10 00:47:23.208811 env[1196]: time="2025-05-10T00:47:23.208636645Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:23.209175 env[1196]: time="2025-05-10T00:47:23.208685568Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:23.209175 env[1196]: time="2025-05-10T00:47:23.208718469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:23.209447 env[1196]: time="2025-05-10T00:47:23.209348574Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202 pid=3998 runtime=io.containerd.runc.v2 May 10 00:47:23.225033 systemd[1]: run-containerd-runc-k8s.io-d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202-runc.m54ETM.mount: Deactivated successfully. May 10 00:47:23.226860 systemd[1]: Started cri-containerd-d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202.scope. May 10 00:47:23.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit: BPF prog-id=142 op=LOAD May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3998 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437303433613634663831636430616266396236636539653432616666 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3998 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437303433613634663831636430616266396236636539653432616666 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit: BPF prog-id=143 op=LOAD May 10 00:47:23.237000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00032bd10 items=0 ppid=3998 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437303433613634663831636430616266396236636539653432616666 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit: BPF prog-id=144 op=LOAD May 10 00:47:23.237000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00032bd58 items=0 ppid=3998 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437303433613634663831636430616266396236636539653432616666 May 10 00:47:23.237000 audit: BPF prog-id=144 op=UNLOAD May 10 00:47:23.237000 audit: BPF prog-id=143 op=UNLOAD May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.237000 audit: BPF prog-id=145 op=LOAD May 10 00:47:23.237000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037e168 items=0 ppid=3998 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437303433613634663831636430616266396236636539653432616666 May 10 00:47:23.248550 env[1196]: time="2025-05-10T00:47:23.248513087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ztgjm,Uid:99a93dc5-8b5a-4079-850b-1c00e3f4f5e1,Namespace:calico-system,Attempt:0,} returns sandbox id \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\"" May 10 00:47:23.249347 kubelet[2056]: E0510 00:47:23.249305 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:23.250796 env[1196]: time="2025-05-10T00:47:23.250759086Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:47:23.258557 env[1196]: time="2025-05-10T00:47:23.258531484Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:47:23.281040 env[1196]: time="2025-05-10T00:47:23.280976334Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e\"" May 10 00:47:23.281978 env[1196]: time="2025-05-10T00:47:23.281946173Z" level=info msg="StartContainer for \"12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e\"" May 10 00:47:23.288015 env[1196]: time="2025-05-10T00:47:23.287954485Z" level=error msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" failed" error="failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:47:23.288202 kubelet[2056]: E0510 00:47:23.288160 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:23.288303 kubelet[2056]: E0510 00:47:23.288276 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f"} May 10 00:47:23.288332 kubelet[2056]: E0510 00:47:23.288319 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:47:23.288401 kubelet[2056]: E0510 00:47:23.288341 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3d9b60d-7aa1-4633-8018-3b0a97709da2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-67xzr" podUID="a3d9b60d-7aa1-4633-8018-3b0a97709da2" May 10 00:47:23.301346 systemd[1]: Started cri-containerd-12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e.scope. May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbf4c253238 items=0 ppid=3998 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132613663303564383437366531366231333664306435323632306439 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.318000 audit: BPF prog-id=146 op=LOAD May 10 00:47:23.318000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=3998 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132613663303564383437366531366231333664306435323632306439 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit: BPF prog-id=147 op=LOAD May 10 00:47:23.319000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=3998 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132613663303564383437366531366231333664306435323632306439 May 10 00:47:23.319000 audit: BPF prog-id=147 op=UNLOAD May 10 00:47:23.319000 audit: BPF prog-id=146 op=UNLOAD May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.319000 audit: BPF prog-id=148 op=LOAD May 10 00:47:23.319000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=3998 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132613663303564383437366531366231333664306435323632306439 May 10 00:47:23.340742 env[1196]: time="2025-05-10T00:47:23.340643453Z" level=info msg="StartContainer for \"12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e\" returns successfully" May 10 00:47:23.373138 systemd[1]: cri-containerd-12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e.scope: Deactivated successfully. May 10 00:47:23.379000 audit: BPF prog-id=148 op=UNLOAD May 10 00:47:23.407236 env[1196]: time="2025-05-10T00:47:23.407188293Z" level=info msg="shim disconnected" id=12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e May 10 00:47:23.407486 env[1196]: time="2025-05-10T00:47:23.407448086Z" level=warning msg="cleaning up after shim disconnected" id=12a6c05d8476e16b136d0d52620d958d6b2ed430089306d86038df751d66c65e namespace=k8s.io May 10 00:47:23.407486 env[1196]: time="2025-05-10T00:47:23.407469527Z" level=info msg="cleaning up dead shim" May 10 00:47:23.413687 env[1196]: time="2025-05-10T00:47:23.413643994Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:47:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4101 runtime=io.containerd.runc.v2\n" May 10 00:47:23.547797 kubelet[2056]: E0510 00:47:23.546728 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:23.550225 env[1196]: time="2025-05-10T00:47:23.550191582Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:47:23.569324 env[1196]: time="2025-05-10T00:47:23.569250341Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da\"" May 10 00:47:23.569874 env[1196]: time="2025-05-10T00:47:23.569836953Z" level=info msg="StartContainer for \"cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da\"" May 10 00:47:23.586257 systemd[1]: Started cri-containerd-cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da.scope. May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7fa7cd3b58f8 items=0 ppid=3998 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623062653363333463366532643965303565313163656632383534 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit: BPF prog-id=149 op=LOAD May 10 00:47:23.599000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000e9ba8 items=0 ppid=3998 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623062653363333463366532643965303565313163656632383534 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit: BPF prog-id=150 op=LOAD May 10 00:47:23.599000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0000e9bf8 items=0 ppid=3998 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623062653363333463366532643965303565313163656632383534 May 10 00:47:23.599000 audit: BPF prog-id=150 op=UNLOAD May 10 00:47:23.599000 audit: BPF prog-id=149 op=UNLOAD May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:23.599000 audit: BPF prog-id=151 op=LOAD May 10 00:47:23.599000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000e9c88 items=0 ppid=3998 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:23.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623062653363333463366532643965303565313163656632383534 May 10 00:47:23.613881 env[1196]: time="2025-05-10T00:47:23.613822949Z" level=info msg="StartContainer for \"cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da\" returns successfully" May 10 00:47:24.261356 kubelet[2056]: I0510 00:47:24.261309 2056 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="30648fc3-8d2b-45f3-8ce4-28fd3878a684" path="/var/lib/kubelet/pods/30648fc3-8d2b-45f3-8ce4-28fd3878a684/volumes" May 10 00:47:24.392421 systemd[1]: Started sshd@19-10.0.0.118:22-10.0.0.1:49928.service. May 10 00:47:24.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:24.395841 kernel: kauditd_printk_skb: 147 callbacks suppressed May 10 00:47:24.396041 kernel: audit: type=1130 audit(1746838044.391:1161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:24.437000 audit[4156]: USER_ACCT pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.438602 sshd[4156]: Accepted publickey for core from 10.0.0.1 port 49928 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:24.442000 audit[4156]: CRED_ACQ pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.443694 sshd[4156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:24.447927 kernel: audit: type=1101 audit(1746838044.437:1162): pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.448005 kernel: audit: type=1103 audit(1746838044.442:1163): pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.448034 kernel: audit: type=1006 audit(1746838044.442:1164): pid=4156 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 10 00:47:24.448286 systemd-logind[1181]: New session 20 of user core. May 10 00:47:24.449434 systemd[1]: Started session-20.scope. May 10 00:47:24.450672 kernel: audit: type=1300 audit(1746838044.442:1164): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffefa95130 a2=3 a3=0 items=0 ppid=1 pid=4156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:24.442000 audit[4156]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffefa95130 a2=3 a3=0 items=0 ppid=1 pid=4156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:24.442000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:24.457170 kernel: audit: type=1327 audit(1746838044.442:1164): proctitle=737368643A20636F7265205B707269765D May 10 00:47:24.457208 kernel: audit: type=1105 audit(1746838044.454:1165): pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.454000 audit[4156]: USER_START pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.455000 audit[4158]: CRED_ACQ pid=4158 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.466779 kernel: audit: type=1103 audit(1746838044.455:1166): pid=4158 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.551087 kubelet[2056]: E0510 00:47:24.550984 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:24.622834 sshd[4156]: pam_unix(sshd:session): session closed for user core May 10 00:47:24.623000 audit[4156]: USER_END pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.625698 systemd-logind[1181]: Session 20 logged out. Waiting for processes to exit. May 10 00:47:24.626506 systemd[1]: sshd@19-10.0.0.118:22-10.0.0.1:49928.service: Deactivated successfully. May 10 00:47:24.627442 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:47:24.628237 systemd-logind[1181]: Removed session 20. May 10 00:47:24.623000 audit[4156]: CRED_DISP pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.636007 kernel: audit: type=1106 audit(1746838044.623:1167): pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.636127 kernel: audit: type=1104 audit(1746838044.623:1168): pid=4156 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:24.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:25.531111 systemd[1]: cri-containerd-cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da.scope: Deactivated successfully. May 10 00:47:25.536000 audit: BPF prog-id=151 op=UNLOAD May 10 00:47:25.552603 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da-rootfs.mount: Deactivated successfully. May 10 00:47:25.561331 env[1196]: time="2025-05-10T00:47:25.561252975Z" level=info msg="shim disconnected" id=cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da May 10 00:47:25.561331 env[1196]: time="2025-05-10T00:47:25.561309132Z" level=warning msg="cleaning up after shim disconnected" id=cdb0be3c34c6e2d9e05e11cef285450556b311933f7e042dcca7f1763a6f60da namespace=k8s.io May 10 00:47:25.561331 env[1196]: time="2025-05-10T00:47:25.561323439Z" level=info msg="cleaning up dead shim" May 10 00:47:25.567952 env[1196]: time="2025-05-10T00:47:25.567894827Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:47:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4181 runtime=io.containerd.runc.v2\n" May 10 00:47:26.559291 kubelet[2056]: E0510 00:47:26.559249 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:26.576063 env[1196]: time="2025-05-10T00:47:26.576005376Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:47:26.592454 env[1196]: time="2025-05-10T00:47:26.592395350Z" level=info msg="CreateContainer within sandbox \"d7043a64f81cd0abf9b6ce9e42affd2fbf71621e1fd6ce01df54002da09ff202\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594\"" May 10 00:47:26.593195 env[1196]: time="2025-05-10T00:47:26.593170419Z" level=info msg="StartContainer for \"924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594\"" May 10 00:47:26.609397 systemd[1]: Started cri-containerd-924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594.scope. May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f958649be68 items=0 ppid=3998 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932346266616264656530313337303836336632336565353264616337 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit: BPF prog-id=152 op=LOAD May 10 00:47:26.627000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002746c8 items=0 ppid=3998 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932346266616264656530313337303836336632336565353264616337 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit: BPF prog-id=153 op=LOAD May 10 00:47:26.627000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000274718 items=0 ppid=3998 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932346266616264656530313337303836336632336565353264616337 May 10 00:47:26.627000 audit: BPF prog-id=153 op=UNLOAD May 10 00:47:26.627000 audit: BPF prog-id=152 op=UNLOAD May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:26.627000 audit: BPF prog-id=154 op=LOAD May 10 00:47:26.627000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002747a8 items=0 ppid=3998 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932346266616264656530313337303836336632336565353264616337 May 10 00:47:26.751485 env[1196]: time="2025-05-10T00:47:26.751426772Z" level=info msg="StartContainer for \"924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594\" returns successfully" May 10 00:47:27.259112 kubelet[2056]: E0510 00:47:27.259055 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:27.565371 kubelet[2056]: E0510 00:47:27.562892 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:27.580005 kubelet[2056]: I0510 00:47:27.579926 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ztgjm" podStartSLOduration=5.579905024 podStartE2EDuration="5.579905024s" podCreationTimestamp="2025-05-10 00:47:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:47:27.578908746 +0000 UTC m=+87.424648023" watchObservedRunningTime="2025-05-10 00:47:27.579905024 +0000 UTC m=+87.425644301" May 10 00:47:27.581236 systemd[1]: run-containerd-runc-k8s.io-924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594-runc.ciE8hh.mount: Deactivated successfully. May 10 00:47:28.286000 audit[4324]: AVC avc: denied { write } for pid=4324 comm="tee" name="fd" dev="proc" ino=28688 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.286000 audit[4324]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe33129a26 a2=241 a3=1b6 items=1 ppid=4295 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.286000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:47:28.286000 audit: PATH item=0 name="/dev/fd/63" inode=27417 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.286000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.303000 audit[4331]: AVC avc: denied { write } for pid=4331 comm="tee" name="fd" dev="proc" ino=27430 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.303000 audit[4331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc4baba17 a2=241 a3=1b6 items=1 ppid=4298 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.303000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:47:28.303000 audit: PATH item=0 name="/dev/fd/63" inode=27420 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.305000 audit[4338]: AVC avc: denied { write } for pid=4338 comm="tee" name="fd" dev="proc" ino=27435 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.305000 audit[4338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe823f4a16 a2=241 a3=1b6 items=1 ppid=4287 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.305000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:47:28.305000 audit: PATH item=0 name="/dev/fd/63" inode=26556 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.310000 audit[4361]: AVC avc: denied { write } for pid=4361 comm="tee" name="fd" dev="proc" ino=27440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.310000 audit[4361]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc22bfa28 a2=241 a3=1b6 items=1 ppid=4296 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.310000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:47:28.310000 audit: PATH item=0 name="/dev/fd/63" inode=27432 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.310000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.318000 audit[4347]: AVC avc: denied { write } for pid=4347 comm="tee" name="fd" dev="proc" ino=26562 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.318000 audit[4347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8ea49a26 a2=241 a3=1b6 items=1 ppid=4297 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.318000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:47:28.318000 audit: PATH item=0 name="/dev/fd/63" inode=27765 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.318000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.319000 audit[4358]: AVC avc: denied { write } for pid=4358 comm="tee" name="fd" dev="proc" ino=26566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.319000 audit[4358]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8cf74a27 a2=241 a3=1b6 items=1 ppid=4288 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.319000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:47:28.319000 audit: PATH item=0 name="/dev/fd/63" inode=28699 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.319000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.328000 audit[4349]: AVC avc: denied { write } for pid=4349 comm="tee" name="fd" dev="proc" ino=28702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:47:28.328000 audit[4349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff981e6a26 a2=241 a3=1b6 items=1 ppid=4289 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.328000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:47:28.328000 audit: PATH item=0 name="/dev/fd/63" inode=28694 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:28.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.467000 audit: BPF prog-id=155 op=LOAD May 10 00:47:28.467000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd625c9450 a2=98 a3=3 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.468000 audit: BPF prog-id=155 op=UNLOAD May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit: BPF prog-id=156 op=LOAD May 10 00:47:28.468000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd625c9230 a2=74 a3=540051 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.468000 audit: BPF prog-id=156 op=UNLOAD May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.468000 audit: BPF prog-id=157 op=LOAD May 10 00:47:28.468000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd625c9260 a2=94 a3=2 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.468000 audit: BPF prog-id=157 op=UNLOAD May 10 00:47:28.566331 kubelet[2056]: E0510 00:47:28.566195 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:28.579000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit: BPF prog-id=158 op=LOAD May 10 00:47:28.579000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd625c9120 a2=40 a3=1 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.579000 audit: BPF prog-id=158 op=UNLOAD May 10 00:47:28.579000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.579000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd625c91f0 a2=50 a3=7ffd625c92d0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.585457 systemd[1]: run-containerd-runc-k8s.io-924bfabdee01370863f23ee52dac7e3f4668175cd0989b3a15eaaba1e2ec3594-runc.6eWvzs.mount: Deactivated successfully. May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c9130 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd625c9160 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd625c9070 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c9180 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c9160 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c9150 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c9180 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd625c9160 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd625c9180 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd625c9150 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.588000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.588000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd625c91c0 a2=28 a3=0 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd625c8f70 a2=50 a3=1 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit: BPF prog-id=159 op=LOAD May 10 00:47:28.589000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd625c8f70 a2=94 a3=5 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.589000 audit: BPF prog-id=159 op=UNLOAD May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd625c9020 a2=50 a3=1 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd625c9140 a2=4 a3=38 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.589000 audit[4407]: AVC avc: denied { confidentiality } for pid=4407 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.589000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd625c9190 a2=94 a3=6 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { confidentiality } for pid=4407 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.590000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd625c8940 a2=94 a3=83 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.590000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.590000 audit[4407]: AVC avc: denied { confidentiality } for pid=4407 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.590000 audit[4407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd625c8940 a2=94 a3=83 items=0 ppid=4309 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.590000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit: BPF prog-id=160 op=LOAD May 10 00:47:28.598000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2d275250 a2=98 a3=1999999999999999 items=0 ppid=4309 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:28.598000 audit: BPF prog-id=160 op=UNLOAD May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit: BPF prog-id=161 op=LOAD May 10 00:47:28.598000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2d275130 a2=74 a3=ffff items=0 ppid=4309 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:28.598000 audit: BPF prog-id=161 op=UNLOAD May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.598000 audit: BPF prog-id=162 op=LOAD May 10 00:47:28.598000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2d275170 a2=40 a3=7fff2d275350 items=0 ppid=4309 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.598000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:28.598000 audit: BPF prog-id=162 op=UNLOAD May 10 00:47:28.651088 systemd-networkd[1021]: vxlan.calico: Link UP May 10 00:47:28.651098 systemd-networkd[1021]: vxlan.calico: Gained carrier May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit: BPF prog-id=163 op=LOAD May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc40af5500 a2=98 a3=ffffffff items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit: BPF prog-id=163 op=UNLOAD May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit: BPF prog-id=164 op=LOAD May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc40af5310 a2=74 a3=540051 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit: BPF prog-id=164 op=UNLOAD May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit: BPF prog-id=165 op=LOAD May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc40af5340 a2=94 a3=2 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit: BPF prog-id=165 op=UNLOAD May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af5210 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40af5240 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40af5150 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af5260 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af5240 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af5230 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af5260 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40af5240 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40af5260 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.676000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.676000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40af5230 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc40af52a0 a2=28 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit: BPF prog-id=166 op=LOAD May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc40af5110 a2=40 a3=0 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit: BPF prog-id=166 op=UNLOAD May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc40af5100 a2=50 a3=2800 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc40af5100 a2=50 a3=2800 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit: BPF prog-id=167 op=LOAD May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc40af4920 a2=94 a3=2 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.677000 audit: BPF prog-id=167 op=UNLOAD May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.677000 audit: BPF prog-id=168 op=LOAD May 10 00:47:28.677000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc40af4a20 a2=94 a3=30 items=0 ppid=4309 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit: BPF prog-id=169 op=LOAD May 10 00:47:28.680000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb5652c70 a2=98 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.680000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.680000 audit: BPF prog-id=169 op=UNLOAD May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.680000 audit: BPF prog-id=170 op=LOAD May 10 00:47:28.680000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5652a50 a2=74 a3=540051 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.680000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.681000 audit: BPF prog-id=170 op=UNLOAD May 10 00:47:28.681000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.681000 audit: BPF prog-id=171 op=LOAD May 10 00:47:28.681000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5652a80 a2=94 a3=2 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.681000 audit: BPF prog-id=171 op=UNLOAD May 10 00:47:28.798000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit: BPF prog-id=172 op=LOAD May 10 00:47:28.798000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5652940 a2=40 a3=1 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.798000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.798000 audit: BPF prog-id=172 op=UNLOAD May 10 00:47:28.798000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.798000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb5652a10 a2=50 a3=7fffb5652af0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.798000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5652950 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5652980 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5652890 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb56529a0 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5652980 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5652970 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb56529a0 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5652980 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb56529a0 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5652970 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb56529e0 a2=28 a3=0 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb5652790 a2=50 a3=1 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit: BPF prog-id=173 op=LOAD May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb5652790 a2=94 a3=5 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit: BPF prog-id=173 op=UNLOAD May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb5652840 a2=50 a3=1 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb5652960 a2=4 a3=38 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.806000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.806000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb56529b0 a2=94 a3=6 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb5652160 a2=94 a3=83 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { perfmon } for pid=4464 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb5652160 a2=94 a3=83 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5653ba0 a2=10 a3=208 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5653a40 a2=10 a3=3 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb56539e0 a2=10 a3=3 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.807000 audit[4464]: AVC avc: denied { bpf } for pid=4464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:28.807000 audit[4464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb56539e0 a2=10 a3=7 items=0 ppid=4309 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:47:28.813000 audit: BPF prog-id=168 op=UNLOAD May 10 00:47:28.872000 audit[4492]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:28.872000 audit[4492]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd03b4bcb0 a2=0 a3=7ffd03b4bc9c items=0 ppid=4309 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.872000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:28.873000 audit[4493]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:28.873000 audit[4493]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc3bcecdf0 a2=0 a3=7ffc3bcecddc items=0 ppid=4309 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.873000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:28.874000 audit[4496]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:28.874000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff69118070 a2=0 a3=7fff6911805c items=0 ppid=4309 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.874000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:28.881000 audit[4491]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:28.881000 audit[4491]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe091c0200 a2=0 a3=7ffe091c01ec items=0 ppid=4309 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:28.881000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:29.259726 env[1196]: time="2025-05-10T00:47:29.259573107Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" iface="eth0" netns="/var/run/netns/cni-6936309d-9657-c7d4-1359-582d16bb4016" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" iface="eth0" netns="/var/run/netns/cni-6936309d-9657-c7d4-1359-582d16bb4016" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" iface="eth0" netns="/var/run/netns/cni-6936309d-9657-c7d4-1359-582d16bb4016" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.311 [INFO][4516] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.333 [INFO][4526] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.333 [INFO][4526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.333 [INFO][4526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.341 [WARNING][4526] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.341 [INFO][4526] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.342 [INFO][4526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:29.347816 env[1196]: 2025-05-10 00:47:29.345 [INFO][4516] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:47:29.350848 env[1196]: time="2025-05-10T00:47:29.350783825Z" level=info msg="TearDown network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" successfully" May 10 00:47:29.350923 env[1196]: time="2025-05-10T00:47:29.350849150Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" returns successfully" May 10 00:47:29.351174 systemd[1]: run-netns-cni\x2d6936309d\x2d9657\x2dc7d4\x2d1359\x2d582d16bb4016.mount: Deactivated successfully. May 10 00:47:29.351791 env[1196]: time="2025-05-10T00:47:29.351749867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-7jch4,Uid:4302ba5e-ada9-449b-ab80-c3e958906fb4,Namespace:calico-apiserver,Attempt:1,}" May 10 00:47:29.494957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80c1f219ebd: link becomes ready May 10 00:47:29.494567 systemd-networkd[1021]: cali80c1f219ebd: Link UP May 10 00:47:29.494825 systemd-networkd[1021]: cali80c1f219ebd: Gained carrier May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.411 [INFO][4534] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0 calico-apiserver-568d49455f- calico-apiserver 4302ba5e-ada9-449b-ab80-c3e958906fb4 1140 0 2025-05-10 00:46:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:568d49455f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-568d49455f-7jch4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali80c1f219ebd [] []}} ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.412 [INFO][4534] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.447 [INFO][4549] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" HandleID="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.457 [INFO][4549] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" HandleID="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002955a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-568d49455f-7jch4", "timestamp":"2025-05-10 00:47:29.447138444 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.457 [INFO][4549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.457 [INFO][4549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.457 [INFO][4549] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.459 [INFO][4549] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.463 [INFO][4549] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.469 [INFO][4549] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.472 [INFO][4549] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.475 [INFO][4549] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.475 [INFO][4549] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.477 [INFO][4549] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431 May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.482 [INFO][4549] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.488 [INFO][4549] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.488 [INFO][4549] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" host="localhost" May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.488 [INFO][4549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:29.508318 env[1196]: 2025-05-10 00:47:29.488 [INFO][4549] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" HandleID="k8s-pod-network.da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.491 [INFO][4534] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"4302ba5e-ada9-449b-ab80-c3e958906fb4", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-568d49455f-7jch4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80c1f219ebd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.491 [INFO][4534] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.491 [INFO][4534] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali80c1f219ebd ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.494 [INFO][4534] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.495 [INFO][4534] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"4302ba5e-ada9-449b-ab80-c3e958906fb4", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431", Pod:"calico-apiserver-568d49455f-7jch4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80c1f219ebd", MAC:"b6:a0:cd:20:54:16", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:29.509294 env[1196]: 2025-05-10 00:47:29.505 [INFO][4534] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-7jch4" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:47:29.520000 audit[4569]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:29.522508 kernel: kauditd_printk_skb: 560 callbacks suppressed May 10 00:47:29.522593 kernel: audit: type=1325 audit(1746838049.520:1279): table=filter:101 family=2 entries=40 op=nft_register_chain pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:29.520000 audit[4569]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc14ce17d0 a2=0 a3=7ffc14ce17bc items=0 ppid=4309 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.531983 kernel: audit: type=1300 audit(1746838049.520:1279): arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc14ce17d0 a2=0 a3=7ffc14ce17bc items=0 ppid=4309 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.532219 kernel: audit: type=1327 audit(1746838049.520:1279): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:29.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:29.541072 env[1196]: time="2025-05-10T00:47:29.540988437Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:29.541072 env[1196]: time="2025-05-10T00:47:29.541038962Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:29.541072 env[1196]: time="2025-05-10T00:47:29.541054572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:29.541313 env[1196]: time="2025-05-10T00:47:29.541235655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431 pid=4577 runtime=io.containerd.runc.v2 May 10 00:47:29.554218 systemd[1]: Started cri-containerd-da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431.scope. May 10 00:47:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.572732 kernel: audit: type=1400 audit(1746838049.565:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.572816 kernel: audit: type=1400 audit(1746838049.565:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.572843 kernel: audit: type=1400 audit(1746838049.565:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.579462 kernel: audit: type=1400 audit(1746838049.565:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.579531 kernel: audit: type=1400 audit(1746838049.565:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582962 kernel: audit: type=1400 audit(1746838049.565:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.589323 kernel: audit: type=1400 audit(1746838049.565:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.589480 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.568000 audit: BPF prog-id=174 op=LOAD May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4577 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313635323235633537393562613631383933373666303365313339 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4577 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313635323235633537393562613631383933373666303365313339 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.569000 audit: BPF prog-id=175 op=LOAD May 10 00:47:29.569000 audit[4586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ee320 items=0 ppid=4577 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313635323235633537393562613631383933373666303365313339 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.575000 audit: BPF prog-id=176 op=LOAD May 10 00:47:29.575000 audit[4586]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ee368 items=0 ppid=4577 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313635323235633537393562613631383933373666303365313339 May 10 00:47:29.582000 audit: BPF prog-id=176 op=UNLOAD May 10 00:47:29.582000 audit: BPF prog-id=175 op=UNLOAD May 10 00:47:29.582000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { perfmon } for pid=4586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit[4586]: AVC avc: denied { bpf } for pid=4586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.582000 audit: BPF prog-id=177 op=LOAD May 10 00:47:29.582000 audit[4586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee778 items=0 ppid=4577 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313635323235633537393562613631383933373666303365313339 May 10 00:47:29.613899 env[1196]: time="2025-05-10T00:47:29.613854421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-7jch4,Uid:4302ba5e-ada9-449b-ab80-c3e958906fb4,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431\"" May 10 00:47:29.615478 env[1196]: time="2025-05-10T00:47:29.615456247Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:47:29.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:47796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:29.626835 systemd[1]: Started sshd@20-10.0.0.118:22-10.0.0.1:47796.service. May 10 00:47:29.671000 audit[4612]: USER_ACCT pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.672898 sshd[4612]: Accepted publickey for core from 10.0.0.1 port 47796 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:29.673000 audit[4612]: CRED_ACQ pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.673000 audit[4612]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5e672930 a2=3 a3=0 items=0 ppid=1 pid=4612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:29.674398 sshd[4612]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:29.678769 systemd-logind[1181]: New session 21 of user core. May 10 00:47:29.679855 systemd[1]: Started session-21.scope. May 10 00:47:29.684000 audit[4612]: USER_START pid=4612 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.685000 audit[4614]: CRED_ACQ pid=4614 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.798312 sshd[4612]: pam_unix(sshd:session): session closed for user core May 10 00:47:29.798000 audit[4612]: USER_END pid=4612 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.798000 audit[4612]: CRED_DISP pid=4612 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:29.800815 systemd[1]: sshd@20-10.0.0.118:22-10.0.0.1:47796.service: Deactivated successfully. May 10 00:47:29.801540 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:47:29.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:47796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:29.802229 systemd-logind[1181]: Session 21 logged out. Waiting for processes to exit. May 10 00:47:29.802937 systemd-logind[1181]: Removed session 21. May 10 00:47:30.661894 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL May 10 00:47:31.301940 systemd-networkd[1021]: cali80c1f219ebd: Gained IPv6LL May 10 00:47:33.259879 env[1196]: time="2025-05-10T00:47:33.259813672Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:47:33.338845 env[1196]: time="2025-05-10T00:47:33.338794812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:33.340656 env[1196]: time="2025-05-10T00:47:33.340631303Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:33.342098 env[1196]: time="2025-05-10T00:47:33.342058738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:33.343596 env[1196]: time="2025-05-10T00:47:33.343561597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:33.344885 env[1196]: time="2025-05-10T00:47:33.344851031Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:47:33.347288 env[1196]: time="2025-05-10T00:47:33.347214881Z" level=info msg="CreateContainer within sandbox \"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:47:33.365748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1674264902.mount: Deactivated successfully. May 10 00:47:33.369951 env[1196]: time="2025-05-10T00:47:33.369889986Z" level=info msg="CreateContainer within sandbox \"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"907555ce1d5a94a4eec094002336654acf6034f6d9f5a3232d9c3ec613b0f8b5\"" May 10 00:47:33.370605 env[1196]: time="2025-05-10T00:47:33.370570316Z" level=info msg="StartContainer for \"907555ce1d5a94a4eec094002336654acf6034f6d9f5a3232d9c3ec613b0f8b5\"" May 10 00:47:33.398692 systemd[1]: Started cri-containerd-907555ce1d5a94a4eec094002336654acf6034f6d9f5a3232d9c3ec613b0f8b5.scope. May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.358 [INFO][4643] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.363 [INFO][4643] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" iface="eth0" netns="/var/run/netns/cni-aeb6ab10-1cea-9af2-8a8c-b8cffe23d6d4" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.363 [INFO][4643] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" iface="eth0" netns="/var/run/netns/cni-aeb6ab10-1cea-9af2-8a8c-b8cffe23d6d4" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.364 [INFO][4643] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" iface="eth0" netns="/var/run/netns/cni-aeb6ab10-1cea-9af2-8a8c-b8cffe23d6d4" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.364 [INFO][4643] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.364 [INFO][4643] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.387 [INFO][4651] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.387 [INFO][4651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.388 [INFO][4651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.400 [WARNING][4651] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.400 [INFO][4651] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.403 [INFO][4651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:33.407045 env[1196]: 2025-05-10 00:47:33.405 [INFO][4643] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:47:33.409560 systemd[1]: run-netns-cni\x2daeb6ab10\x2d1cea\x2d9af2\x2d8a8c\x2db8cffe23d6d4.mount: Deactivated successfully. May 10 00:47:33.409905 env[1196]: time="2025-05-10T00:47:33.409842376Z" level=info msg="TearDown network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" successfully" May 10 00:47:33.409905 env[1196]: time="2025-05-10T00:47:33.409894195Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" returns successfully" May 10 00:47:33.411308 env[1196]: time="2025-05-10T00:47:33.411256746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-pwpxx,Uid:da224529-209a-4c8a-9fe1-7dadb25d5795,Namespace:calico-apiserver,Attempt:1,}" May 10 00:47:33.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit: BPF prog-id=178 op=LOAD May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4577 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373535356365316435613934613465656330393430303233333636 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4577 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373535356365316435613934613465656330393430303233333636 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit: BPF prog-id=179 op=LOAD May 10 00:47:33.418000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000358e90 items=0 ppid=4577 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373535356365316435613934613465656330393430303233333636 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.418000 audit: BPF prog-id=180 op=LOAD May 10 00:47:33.418000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000358ed8 items=0 ppid=4577 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373535356365316435613934613465656330393430303233333636 May 10 00:47:33.419000 audit: BPF prog-id=180 op=UNLOAD May 10 00:47:33.419000 audit: BPF prog-id=179 op=UNLOAD May 10 00:47:33.419000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:33.419000 audit: BPF prog-id=181 op=LOAD May 10 00:47:33.419000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003592e8 items=0 ppid=4577 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373535356365316435613934613465656330393430303233333636 May 10 00:47:33.508748 env[1196]: time="2025-05-10T00:47:33.508666263Z" level=info msg="StartContainer for \"907555ce1d5a94a4eec094002336654acf6034f6d9f5a3232d9c3ec613b0f8b5\" returns successfully" May 10 00:47:34.026000 audit[4726]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.026000 audit[4726]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe2d456080 a2=0 a3=7ffe2d45606c items=0 ppid=2252 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.033000 audit[4726]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.033000 audit[4726]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe2d456080 a2=0 a3=0 items=0 ppid=2252 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.075010 systemd-networkd[1021]: calid89a10b31d1: Link UP May 10 00:47:34.077285 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:34.077436 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid89a10b31d1: link becomes ready May 10 00:47:34.077694 systemd-networkd[1021]: calid89a10b31d1: Gained carrier May 10 00:47:34.112735 kubelet[2056]: I0510 00:47:34.112523 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-568d49455f-7jch4" podStartSLOduration=70.38213719 podStartE2EDuration="1m14.112493867s" podCreationTimestamp="2025-05-10 00:46:20 +0000 UTC" firstStartedPulling="2025-05-10 00:47:29.615214058 +0000 UTC m=+89.460953335" lastFinishedPulling="2025-05-10 00:47:33.345570735 +0000 UTC m=+93.191310012" observedRunningTime="2025-05-10 00:47:33.71089476 +0000 UTC m=+93.556634067" watchObservedRunningTime="2025-05-10 00:47:34.112493867 +0000 UTC m=+93.958233144" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.934 [INFO][4698] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0 calico-apiserver-568d49455f- calico-apiserver da224529-209a-4c8a-9fe1-7dadb25d5795 1161 0 2025-05-10 00:46:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:568d49455f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-568d49455f-pwpxx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid89a10b31d1 [] []}} ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.934 [INFO][4698] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.968 [INFO][4718] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" HandleID="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.978 [INFO][4718] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" HandleID="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001348b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-568d49455f-pwpxx", "timestamp":"2025-05-10 00:47:33.968789017 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.978 [INFO][4718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.978 [INFO][4718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.978 [INFO][4718] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.980 [INFO][4718] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.984 [INFO][4718] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.988 [INFO][4718] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.990 [INFO][4718] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.992 [INFO][4718] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.992 [INFO][4718] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:33.994 [INFO][4718] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67 May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:34.044 [INFO][4718] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:34.060 [INFO][4718] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:34.060 [INFO][4718] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" host="localhost" May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:34.060 [INFO][4718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:34.116309 env[1196]: 2025-05-10 00:47:34.060 [INFO][4718] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" HandleID="k8s-pod-network.1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.062 [INFO][4698] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"da224529-209a-4c8a-9fe1-7dadb25d5795", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-568d49455f-pwpxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid89a10b31d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.063 [INFO][4698] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.063 [INFO][4698] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid89a10b31d1 ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.078 [INFO][4698] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.078 [INFO][4698] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"da224529-209a-4c8a-9fe1-7dadb25d5795", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67", Pod:"calico-apiserver-568d49455f-pwpxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid89a10b31d1", MAC:"92:14:5f:b7:50:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:34.117172 env[1196]: 2025-05-10 00:47:34.114 [INFO][4698] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67" Namespace="calico-apiserver" Pod="calico-apiserver-568d49455f-pwpxx" WorkloadEndpoint="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:47:34.127000 audit[4740]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=4740 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:34.127000 audit[4740]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7fff20034210 a2=0 a3=7fff200341fc items=0 ppid=4309 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.127000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:34.142766 env[1196]: time="2025-05-10T00:47:34.142538597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:34.142966 env[1196]: time="2025-05-10T00:47:34.142814931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:34.142966 env[1196]: time="2025-05-10T00:47:34.142839728Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:34.143143 env[1196]: time="2025-05-10T00:47:34.143047642Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67 pid=4754 runtime=io.containerd.runc.v2 May 10 00:47:34.158137 systemd[1]: Started cri-containerd-1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67.scope. May 10 00:47:34.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.173000 audit: BPF prog-id=182 op=LOAD May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4754 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333264336239366139323833353738316235356664383761326435 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4754 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333264336239366139323833353738316235356664383761326435 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit: BPF prog-id=183 op=LOAD May 10 00:47:34.174000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbd80 items=0 ppid=4754 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333264336239366139323833353738316235356664383761326435 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit: BPF prog-id=184 op=LOAD May 10 00:47:34.174000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbdc8 items=0 ppid=4754 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333264336239366139323833353738316235356664383761326435 May 10 00:47:34.174000 audit: BPF prog-id=184 op=UNLOAD May 10 00:47:34.174000 audit: BPF prog-id=183 op=UNLOAD May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.174000 audit: BPF prog-id=185 op=LOAD May 10 00:47:34.174000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f21d8 items=0 ppid=4754 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333264336239366139323833353738316235356664383761326435 May 10 00:47:34.177907 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:34.203275 env[1196]: time="2025-05-10T00:47:34.203222054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-568d49455f-pwpxx,Uid:da224529-209a-4c8a-9fe1-7dadb25d5795,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67\"" May 10 00:47:34.207211 env[1196]: time="2025-05-10T00:47:34.207161440Z" level=info msg="CreateContainer within sandbox \"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:47:34.232970 env[1196]: time="2025-05-10T00:47:34.232885622Z" level=info msg="CreateContainer within sandbox \"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fcb03cb9bc96b041f4346bb6d8cf0a36db9cd25a7f18dc6c38be6661319373c6\"" May 10 00:47:34.233856 env[1196]: time="2025-05-10T00:47:34.233818891Z" level=info msg="StartContainer for \"fcb03cb9bc96b041f4346bb6d8cf0a36db9cd25a7f18dc6c38be6661319373c6\"" May 10 00:47:34.253556 systemd[1]: Started cri-containerd-fcb03cb9bc96b041f4346bb6d8cf0a36db9cd25a7f18dc6c38be6661319373c6.scope. May 10 00:47:34.261033 env[1196]: time="2025-05-10T00:47:34.260989464Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:47:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.277000 audit: BPF prog-id=186 op=LOAD May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4754 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623033636239626339366230343166343334366262366438636630 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4754 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623033636239626339366230343166343334366262366438636630 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit: BPF prog-id=187 op=LOAD May 10 00:47:34.278000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0c10 items=0 ppid=4754 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623033636239626339366230343166343334366262366438636630 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit: BPF prog-id=188 op=LOAD May 10 00:47:34.278000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0c58 items=0 ppid=4754 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623033636239626339366230343166343334366262366438636630 May 10 00:47:34.278000 audit: BPF prog-id=188 op=UNLOAD May 10 00:47:34.278000 audit: BPF prog-id=187 op=UNLOAD May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.278000 audit: BPF prog-id=189 op=LOAD May 10 00:47:34.278000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d1068 items=0 ppid=4754 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623033636239626339366230343166343334366262366438636630 May 10 00:47:34.312090 env[1196]: time="2025-05-10T00:47:34.312001451Z" level=info msg="StartContainer for \"fcb03cb9bc96b041f4346bb6d8cf0a36db9cd25a7f18dc6c38be6661319373c6\" returns successfully" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.331 [INFO][4829] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.332 [INFO][4829] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" iface="eth0" netns="/var/run/netns/cni-8c0748fe-cca3-80f0-772e-42d961dcc405" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.332 [INFO][4829] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" iface="eth0" netns="/var/run/netns/cni-8c0748fe-cca3-80f0-772e-42d961dcc405" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.332 [INFO][4829] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" iface="eth0" netns="/var/run/netns/cni-8c0748fe-cca3-80f0-772e-42d961dcc405" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.332 [INFO][4829] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.332 [INFO][4829] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.364 [INFO][4848] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.364 [INFO][4848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.364 [INFO][4848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.383 [WARNING][4848] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.383 [INFO][4848] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.386 [INFO][4848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:34.389933 env[1196]: 2025-05-10 00:47:34.388 [INFO][4829] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:47:34.390998 env[1196]: time="2025-05-10T00:47:34.390951195Z" level=info msg="TearDown network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" successfully" May 10 00:47:34.391125 env[1196]: time="2025-05-10T00:47:34.391099917Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" returns successfully" May 10 00:47:34.392112 env[1196]: time="2025-05-10T00:47:34.392040309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6m6bf,Uid:d85926ec-2929-465e-88c7-112e20f322a9,Namespace:calico-system,Attempt:1,}" May 10 00:47:34.393509 systemd[1]: run-netns-cni\x2d8c0748fe\x2dcca3\x2d80f0\x2d772e\x2d42d961dcc405.mount: Deactivated successfully. May 10 00:47:34.543397 systemd-networkd[1021]: cali692a23c8bd5: Link UP May 10 00:47:34.545119 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali692a23c8bd5: link becomes ready May 10 00:47:34.545232 systemd-networkd[1021]: cali692a23c8bd5: Gained carrier May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.463 [INFO][4860] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--6m6bf-eth0 csi-node-driver- calico-system d85926ec-2929-465e-88c7-112e20f322a9 1181 0 2025-05-10 00:46:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-6m6bf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali692a23c8bd5 [] []}} ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.463 [INFO][4860] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.501 [INFO][4873] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" HandleID="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.513 [INFO][4873] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" HandleID="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334c50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-6m6bf", "timestamp":"2025-05-10 00:47:34.501693633 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.513 [INFO][4873] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.513 [INFO][4873] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.513 [INFO][4873] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.515 [INFO][4873] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.519 [INFO][4873] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.523 [INFO][4873] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.525 [INFO][4873] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.527 [INFO][4873] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.527 [INFO][4873] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.528 [INFO][4873] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.533 [INFO][4873] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.539 [INFO][4873] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.539 [INFO][4873] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" host="localhost" May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.539 [INFO][4873] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:34.564797 env[1196]: 2025-05-10 00:47:34.539 [INFO][4873] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" HandleID="k8s-pod-network.b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.541 [INFO][4860] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6m6bf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d85926ec-2929-465e-88c7-112e20f322a9", ResourceVersion:"1181", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-6m6bf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali692a23c8bd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.541 [INFO][4860] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.541 [INFO][4860] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali692a23c8bd5 ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.544 [INFO][4860] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.545 [INFO][4860] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6m6bf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d85926ec-2929-465e-88c7-112e20f322a9", ResourceVersion:"1181", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e", Pod:"csi-node-driver-6m6bf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali692a23c8bd5", MAC:"76:bf:4e:02:9b:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:34.565763 env[1196]: 2025-05-10 00:47:34.561 [INFO][4860] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e" Namespace="calico-system" Pod="csi-node-driver-6m6bf" WorkloadEndpoint="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:47:34.569000 audit[4891]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:34.571160 kernel: kauditd_printk_skb: 241 callbacks suppressed May 10 00:47:34.571210 kernel: audit: type=1325 audit(1746838054.569:1364): table=filter:105 family=2 entries=42 op=nft_register_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:34.569000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffedf6fa070 a2=0 a3=7ffedf6fa05c items=0 ppid=4309 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.579268 kernel: audit: type=1300 audit(1746838054.569:1364): arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffedf6fa070 a2=0 a3=7ffedf6fa05c items=0 ppid=4309 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.582620 kernel: audit: type=1327 audit(1746838054.569:1364): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:34.569000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:34.582754 env[1196]: time="2025-05-10T00:47:34.579581735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:34.582754 env[1196]: time="2025-05-10T00:47:34.579619748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:34.582754 env[1196]: time="2025-05-10T00:47:34.579629265Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:34.582754 env[1196]: time="2025-05-10T00:47:34.579815188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e pid=4904 runtime=io.containerd.runc.v2 May 10 00:47:34.587902 kubelet[2056]: I0510 00:47:34.585480 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:47:34.606365 kubelet[2056]: I0510 00:47:34.606293 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-568d49455f-pwpxx" podStartSLOduration=74.606267801 podStartE2EDuration="1m14.606267801s" podCreationTimestamp="2025-05-10 00:46:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:47:34.605692521 +0000 UTC m=+94.451431828" watchObservedRunningTime="2025-05-10 00:47:34.606267801 +0000 UTC m=+94.452007078" May 10 00:47:34.611123 systemd[1]: Started cri-containerd-b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e.scope. May 10 00:47:34.635860 kernel: audit: type=1325 audit(1746838054.625:1365): table=filter:106 family=2 entries=16 op=nft_register_rule pid=4930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.635981 kernel: audit: type=1300 audit(1746838054.625:1365): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffb80dbc90 a2=0 a3=7fffb80dbc7c items=0 ppid=2252 pid=4930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.636003 kernel: audit: type=1327 audit(1746838054.625:1365): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.625000 audit[4930]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=4930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.625000 audit[4930]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffb80dbc90 a2=0 a3=7fffb80dbc7c items=0 ppid=2252 pid=4930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.645893 kernel: audit: type=1325 audit(1746838054.634:1366): table=nat:107 family=2 entries=14 op=nft_register_rule pid=4930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.646050 kernel: audit: type=1300 audit(1746838054.634:1366): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffb80dbc90 a2=0 a3=0 items=0 ppid=2252 pid=4930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.634000 audit[4930]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:34.634000 audit[4930]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffb80dbc90 a2=0 a3=0 items=0 ppid=2252 pid=4930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.652669 kernel: audit: type=1327 audit(1746838054.634:1366): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:34.652739 kernel: audit: type=1400 audit(1746838054.645:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit: BPF prog-id=190 op=LOAD May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4904 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663663613833323265636166386532643365636634646530333738 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4904 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663663613833323265636166386532643365636634646530333738 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.648000 audit: BPF prog-id=191 op=LOAD May 10 00:47:34.648000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a3c40 items=0 ppid=4904 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663663613833323265636166386532643365636634646530333738 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.654285 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit: BPF prog-id=192 op=LOAD May 10 00:47:34.652000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a3c88 items=0 ppid=4904 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663663613833323265636166386532643365636634646530333738 May 10 00:47:34.652000 audit: BPF prog-id=192 op=UNLOAD May 10 00:47:34.652000 audit: BPF prog-id=191 op=UNLOAD May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:34.652000 audit: BPF prog-id=193 op=LOAD May 10 00:47:34.652000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000422098 items=0 ppid=4904 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663663613833323265636166386532643365636634646530333738 May 10 00:47:34.662000 audit[4676]: AVC avc: denied { watch } for pid=4676 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_46_40.668680395/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c361,c634 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c361,c634 tclass=file permissive=0 May 10 00:47:34.662000 audit[4676]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001262d80 a2=fc6 a3=0 items=0 ppid=4577 pid=4676 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c361,c634 key=(null) May 10 00:47:34.662000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:34.690627 env[1196]: time="2025-05-10T00:47:34.690565009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6m6bf,Uid:d85926ec-2929-465e-88c7-112e20f322a9,Namespace:calico-system,Attempt:1,} returns sandbox id \"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e\"" May 10 00:47:34.692367 env[1196]: time="2025-05-10T00:47:34.692334333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:47:34.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:34.805148 systemd[1]: Started sshd@21-10.0.0.118:22-10.0.0.1:47800.service. May 10 00:47:34.851000 audit[4944]: USER_ACCT pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:34.852145 sshd[4944]: Accepted publickey for core from 10.0.0.1 port 47800 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:34.852000 audit[4944]: CRED_ACQ pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:34.852000 audit[4944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb2d14f10 a2=3 a3=0 items=0 ppid=1 pid=4944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:34.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:34.853810 sshd[4944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:34.859812 systemd[1]: Started session-22.scope. May 10 00:47:34.860348 systemd-logind[1181]: New session 22 of user core. May 10 00:47:34.866000 audit[4944]: USER_START pid=4944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:34.867000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:35.004216 sshd[4944]: pam_unix(sshd:session): session closed for user core May 10 00:47:35.004000 audit[4944]: USER_END pid=4944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:35.004000 audit[4944]: CRED_DISP pid=4944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:35.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:35.007239 systemd[1]: sshd@21-10.0.0.118:22-10.0.0.1:47800.service: Deactivated successfully. May 10 00:47:35.008130 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:47:35.008942 systemd-logind[1181]: Session 22 logged out. Waiting for processes to exit. May 10 00:47:35.009946 systemd-logind[1181]: Removed session 22. May 10 00:47:35.141945 systemd-networkd[1021]: calid89a10b31d1: Gained IPv6LL May 10 00:47:35.260370 kubelet[2056]: E0510 00:47:35.259655 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:35.260828 env[1196]: time="2025-05-10T00:47:35.260680787Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:47:35.266690 env[1196]: time="2025-05-10T00:47:35.261384279Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:47:35.276000 audit[4807]: AVC avc: denied { watch } for pid=4807 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_46_40.1170426917/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c42,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c42,c750 tclass=file permissive=0 May 10 00:47:35.276000 audit[4807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006b9c20 a2=fc6 a3=0 items=0 ppid=4754 pid=4807 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c42,c750 key=(null) May 10 00:47:35.276000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:35.326000 audit[5004]: NETFILTER_CFG table=filter:108 family=2 entries=15 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:35.326000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff167ec510 a2=0 a3=7fff167ec4fc items=0 ppid=2252 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:35.333000 audit[5004]: NETFILTER_CFG table=nat:109 family=2 entries=21 op=nft_register_chain pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:35.333000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7fff167ec510 a2=0 a3=7fff167ec4fc items=0 ppid=2252 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.345 [INFO][4993] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.346 [INFO][4993] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" iface="eth0" netns="/var/run/netns/cni-2e0c331a-aa3e-ef04-03ef-c9184b974158" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.346 [INFO][4993] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" iface="eth0" netns="/var/run/netns/cni-2e0c331a-aa3e-ef04-03ef-c9184b974158" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.346 [INFO][4993] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" iface="eth0" netns="/var/run/netns/cni-2e0c331a-aa3e-ef04-03ef-c9184b974158" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.346 [INFO][4993] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.346 [INFO][4993] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.369 [INFO][5013] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.369 [INFO][5013] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.369 [INFO][5013] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.376 [WARNING][5013] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.376 [INFO][5013] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.378 [INFO][5013] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:35.382507 env[1196]: 2025-05-10 00:47:35.380 [INFO][4993] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:47:35.386028 systemd[1]: run-netns-cni\x2d2e0c331a\x2daa3e\x2def04\x2d03ef\x2dc9184b974158.mount: Deactivated successfully. May 10 00:47:35.387113 env[1196]: time="2025-05-10T00:47:35.387032557Z" level=info msg="TearDown network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" successfully" May 10 00:47:35.387113 env[1196]: time="2025-05-10T00:47:35.387103602Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" returns successfully" May 10 00:47:35.387499 kubelet[2056]: E0510 00:47:35.387470 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:35.388132 env[1196]: time="2025-05-10T00:47:35.388093708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vczlc,Uid:ba49d75b-6d9b-4b78-a4a9-bbbecf477921,Namespace:kube-system,Attempt:1,}" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.336 [INFO][4988] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.337 [INFO][4988] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" iface="eth0" netns="/var/run/netns/cni-af996d7a-484d-208c-0b10-06fc1bf06200" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.337 [INFO][4988] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" iface="eth0" netns="/var/run/netns/cni-af996d7a-484d-208c-0b10-06fc1bf06200" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.337 [INFO][4988] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" iface="eth0" netns="/var/run/netns/cni-af996d7a-484d-208c-0b10-06fc1bf06200" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.337 [INFO][4988] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.337 [INFO][4988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.380 [INFO][5007] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.380 [INFO][5007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.380 [INFO][5007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.386 [WARNING][5007] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.386 [INFO][5007] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.388 [INFO][5007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:35.393402 env[1196]: 2025-05-10 00:47:35.391 [INFO][4988] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:47:35.393844 env[1196]: time="2025-05-10T00:47:35.393442745Z" level=info msg="TearDown network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" successfully" May 10 00:47:35.393844 env[1196]: time="2025-05-10T00:47:35.393471049Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" returns successfully" May 10 00:47:35.396453 systemd[1]: run-netns-cni\x2daf996d7a\x2d484d\x2d208c\x2d0b10\x2d06fc1bf06200.mount: Deactivated successfully. May 10 00:47:35.397626 env[1196]: time="2025-05-10T00:47:35.397592450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d67d94876-ngbtx,Uid:65a67f7d-1937-4f82-aa43-01aa3ce567af,Namespace:calico-system,Attempt:1,}" May 10 00:47:35.534366 systemd-networkd[1021]: cali3ef2592474a: Link UP May 10 00:47:35.537103 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:35.537221 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3ef2592474a: link becomes ready May 10 00:47:35.537338 systemd-networkd[1021]: cali3ef2592474a: Gained carrier May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.466 [INFO][5031] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0 calico-kube-controllers-5d67d94876- calico-system 65a67f7d-1937-4f82-aa43-01aa3ce567af 1205 0 2025-05-10 00:46:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d67d94876 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5d67d94876-ngbtx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3ef2592474a [] []}} ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.466 [INFO][5031] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.495 [INFO][5062] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" HandleID="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.504 [INFO][5062] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" HandleID="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000129970), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5d67d94876-ngbtx", "timestamp":"2025-05-10 00:47:35.49558184 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.504 [INFO][5062] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.504 [INFO][5062] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.504 [INFO][5062] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.505 [INFO][5062] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.509 [INFO][5062] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.514 [INFO][5062] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.515 [INFO][5062] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.518 [INFO][5062] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.518 [INFO][5062] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.519 [INFO][5062] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49 May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.523 [INFO][5062] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.528 [INFO][5062] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.528 [INFO][5062] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" host="localhost" May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.528 [INFO][5062] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:35.550777 env[1196]: 2025-05-10 00:47:35.528 [INFO][5062] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" HandleID="k8s-pod-network.42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.531 [INFO][5031] cni-plugin/k8s.go 386: Populated endpoint ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0", GenerateName:"calico-kube-controllers-5d67d94876-", Namespace:"calico-system", SelfLink:"", UID:"65a67f7d-1937-4f82-aa43-01aa3ce567af", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d67d94876", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5d67d94876-ngbtx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ef2592474a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.531 [INFO][5031] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.531 [INFO][5031] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3ef2592474a ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.537 [INFO][5031] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.539 [INFO][5031] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0", GenerateName:"calico-kube-controllers-5d67d94876-", Namespace:"calico-system", SelfLink:"", UID:"65a67f7d-1937-4f82-aa43-01aa3ce567af", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d67d94876", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49", Pod:"calico-kube-controllers-5d67d94876-ngbtx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ef2592474a", MAC:"7e:0c:df:57:42:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:35.551535 env[1196]: 2025-05-10 00:47:35.548 [INFO][5031] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49" Namespace="calico-system" Pod="calico-kube-controllers-5d67d94876-ngbtx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:47:35.559000 audit[5086]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=5086 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:35.559000 audit[5086]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffd563b66e0 a2=0 a3=7ffd563b66cc items=0 ppid=4309 pid=5086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:35.565932 systemd-networkd[1021]: cali3fc977ecb2d: Link UP May 10 00:47:35.569684 env[1196]: time="2025-05-10T00:47:35.569627565Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:35.569833 env[1196]: time="2025-05-10T00:47:35.569668122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:35.569833 env[1196]: time="2025-05-10T00:47:35.569678432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:35.569955 env[1196]: time="2025-05-10T00:47:35.569908929Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49 pid=5095 runtime=io.containerd.runc.v2 May 10 00:47:35.570158 systemd-networkd[1021]: cali3fc977ecb2d: Gained carrier May 10 00:47:35.570729 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fc977ecb2d: link becomes ready May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.462 [INFO][5024] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0 coredns-7db6d8ff4d- kube-system ba49d75b-6d9b-4b78-a4a9-bbbecf477921 1206 0 2025-05-10 00:46:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-vczlc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3fc977ecb2d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.462 [INFO][5024] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.493 [INFO][5055] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" HandleID="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.503 [INFO][5055] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" HandleID="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00037d070), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-vczlc", "timestamp":"2025-05-10 00:47:35.493678513 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.506 [INFO][5055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.528 [INFO][5055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.528 [INFO][5055] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.530 [INFO][5055] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.534 [INFO][5055] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.538 [INFO][5055] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.542 [INFO][5055] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.545 [INFO][5055] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.545 [INFO][5055] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.548 [INFO][5055] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.553 [INFO][5055] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.561 [INFO][5055] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.561 [INFO][5055] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" host="localhost" May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.561 [INFO][5055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:35.589537 env[1196]: 2025-05-10 00:47:35.561 [INFO][5055] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" HandleID="k8s-pod-network.ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.563 [INFO][5024] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ba49d75b-6d9b-4b78-a4a9-bbbecf477921", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-vczlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3fc977ecb2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.563 [INFO][5024] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.563 [INFO][5024] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3fc977ecb2d ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.570 [INFO][5024] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.575 [INFO][5024] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ba49d75b-6d9b-4b78-a4a9-bbbecf477921", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b", Pod:"coredns-7db6d8ff4d-vczlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3fc977ecb2d", MAC:"8a:4b:48:69:6d:31", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:35.590209 env[1196]: 2025-05-10 00:47:35.586 [INFO][5024] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vczlc" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:47:35.594444 systemd[1]: Started cri-containerd-42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49.scope. May 10 00:47:35.601000 audit[5135]: NETFILTER_CFG table=filter:111 family=2 entries=56 op=nft_register_chain pid=5135 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:35.601000 audit[5135]: SYSCALL arch=c000003e syscall=46 success=yes exit=26752 a0=3 a1=7ffe4da20e70 a2=0 a3=7ffe4da20e5c items=0 ppid=4309 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit: BPF prog-id=194 op=LOAD May 10 00:47:35.606000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.606000 audit[5106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5095 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432626232326639336233326136363862633330633665653038316231 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5095 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432626232326639336233326136363862633330633665653038316231 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit: BPF prog-id=195 op=LOAD May 10 00:47:35.607000 audit[5106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a4d70 items=0 ppid=5095 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432626232326639336233326136363862633330633665653038316231 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit: BPF prog-id=196 op=LOAD May 10 00:47:35.607000 audit[5106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a4db8 items=0 ppid=5095 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432626232326639336233326136363862633330633665653038316231 May 10 00:47:35.607000 audit: BPF prog-id=196 op=UNLOAD May 10 00:47:35.607000 audit: BPF prog-id=195 op=UNLOAD May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { perfmon } for pid=5106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit[5106]: AVC avc: denied { bpf } for pid=5106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.607000 audit: BPF prog-id=197 op=LOAD May 10 00:47:35.607000 audit[5106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a51c8 items=0 ppid=5095 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432626232326639336233326136363862633330633665653038316231 May 10 00:47:35.609598 env[1196]: time="2025-05-10T00:47:35.608637994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:35.609598 env[1196]: time="2025-05-10T00:47:35.608683380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:35.609598 env[1196]: time="2025-05-10T00:47:35.608695013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:35.609598 env[1196]: time="2025-05-10T00:47:35.609096152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b pid=5143 runtime=io.containerd.runc.v2 May 10 00:47:35.609312 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:35.618739 systemd[1]: Started cri-containerd-ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b.scope. May 10 00:47:35.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit: BPF prog-id=198 op=LOAD May 10 00:47:35.631000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.631000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5143 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261366366366634323134393463343031643131306630346130323631 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=5143 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261366366366634323134393463343031643131306630346130323631 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit: BPF prog-id=199 op=LOAD May 10 00:47:35.632000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d07d0 items=0 ppid=5143 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261366366366634323134393463343031643131306630346130323631 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit: BPF prog-id=200 op=LOAD May 10 00:47:35.632000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d0818 items=0 ppid=5143 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261366366366634323134393463343031643131306630346130323631 May 10 00:47:35.632000 audit: BPF prog-id=200 op=UNLOAD May 10 00:47:35.632000 audit: BPF prog-id=199 op=UNLOAD May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { perfmon } for pid=5153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit[5153]: AVC avc: denied { bpf } for pid=5153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.632000 audit: BPF prog-id=201 op=LOAD May 10 00:47:35.632000 audit[5153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d0c28 items=0 ppid=5143 pid=5153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261366366366634323134393463343031643131306630346130323631 May 10 00:47:35.633944 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:35.637841 env[1196]: time="2025-05-10T00:47:35.637785062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d67d94876-ngbtx,Uid:65a67f7d-1937-4f82-aa43-01aa3ce567af,Namespace:calico-system,Attempt:1,} returns sandbox id \"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49\"" May 10 00:47:35.656872 env[1196]: time="2025-05-10T00:47:35.656768027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vczlc,Uid:ba49d75b-6d9b-4b78-a4a9-bbbecf477921,Namespace:kube-system,Attempt:1,} returns sandbox id \"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b\"" May 10 00:47:35.657901 kubelet[2056]: E0510 00:47:35.657637 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:35.665838 env[1196]: time="2025-05-10T00:47:35.665799963Z" level=info msg="CreateContainer within sandbox \"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:47:35.685176 env[1196]: time="2025-05-10T00:47:35.685107113Z" level=info msg="CreateContainer within sandbox \"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5ae290e1f77793a10e1a25e9e33e85a11427cde15a8b4fe5a62a129f80348e30\"" May 10 00:47:35.685946 env[1196]: time="2025-05-10T00:47:35.685894374Z" level=info msg="StartContainer for \"5ae290e1f77793a10e1a25e9e33e85a11427cde15a8b4fe5a62a129f80348e30\"" May 10 00:47:35.700887 systemd[1]: Started cri-containerd-5ae290e1f77793a10e1a25e9e33e85a11427cde15a8b4fe5a62a129f80348e30.scope. May 10 00:47:35.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.717000 audit: BPF prog-id=202 op=LOAD May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=5143 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653239306531663737373933613130653161323565396533336538 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=5143 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653239306531663737373933613130653161323565396533336538 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit: BPF prog-id=203 op=LOAD May 10 00:47:35.718000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000098790 items=0 ppid=5143 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653239306531663737373933613130653161323565396533336538 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit: BPF prog-id=204 op=LOAD May 10 00:47:35.718000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0000987d8 items=0 ppid=5143 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653239306531663737373933613130653161323565396533336538 May 10 00:47:35.718000 audit: BPF prog-id=204 op=UNLOAD May 10 00:47:35.718000 audit: BPF prog-id=203 op=UNLOAD May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:35.718000 audit: BPF prog-id=205 op=LOAD May 10 00:47:35.718000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000098be8 items=0 ppid=5143 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653239306531663737373933613130653161323565396533336538 May 10 00:47:35.729803 env[1196]: time="2025-05-10T00:47:35.729766877Z" level=info msg="StartContainer for \"5ae290e1f77793a10e1a25e9e33e85a11427cde15a8b4fe5a62a129f80348e30\" returns successfully" May 10 00:47:36.113741 env[1196]: time="2025-05-10T00:47:36.113674788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:36.115577 env[1196]: time="2025-05-10T00:47:36.115554921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:36.116981 env[1196]: time="2025-05-10T00:47:36.116933013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:36.118272 env[1196]: time="2025-05-10T00:47:36.118249868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:36.118614 env[1196]: time="2025-05-10T00:47:36.118591385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:47:36.119746 env[1196]: time="2025-05-10T00:47:36.119723371Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:47:36.120369 env[1196]: time="2025-05-10T00:47:36.120346902Z" level=info msg="CreateContainer within sandbox \"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:47:36.137059 env[1196]: time="2025-05-10T00:47:36.136987136Z" level=info msg="CreateContainer within sandbox \"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2eecbd65202dd95ee40ba547a88cb1006719923e8143f78c4090d5dbb4a62a17\"" May 10 00:47:36.138868 env[1196]: time="2025-05-10T00:47:36.137685019Z" level=info msg="StartContainer for \"2eecbd65202dd95ee40ba547a88cb1006719923e8143f78c4090d5dbb4a62a17\"" May 10 00:47:36.156349 systemd[1]: Started cri-containerd-2eecbd65202dd95ee40ba547a88cb1006719923e8143f78c4090d5dbb4a62a17.scope. May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fdc35a46988 items=0 ppid=4904 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656362643635323032646439356565343062613534376138386362 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit: BPF prog-id=206 op=LOAD May 10 00:47:36.168000 audit[5229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00017a5a8 items=0 ppid=4904 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656362643635323032646439356565343062613534376138386362 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit: BPF prog-id=207 op=LOAD May 10 00:47:36.168000 audit[5229]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00017a5f8 items=0 ppid=4904 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656362643635323032646439356565343062613534376138386362 May 10 00:47:36.168000 audit: BPF prog-id=207 op=UNLOAD May 10 00:47:36.168000 audit: BPF prog-id=206 op=UNLOAD May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { perfmon } for pid=5229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit[5229]: AVC avc: denied { bpf } for pid=5229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:36.168000 audit: BPF prog-id=208 op=LOAD May 10 00:47:36.168000 audit[5229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00017a688 items=0 ppid=4904 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656362643635323032646439356565343062613534376138386362 May 10 00:47:36.182726 env[1196]: time="2025-05-10T00:47:36.182660750Z" level=info msg="StartContainer for \"2eecbd65202dd95ee40ba547a88cb1006719923e8143f78c4090d5dbb4a62a17\" returns successfully" May 10 00:47:36.230036 systemd-networkd[1021]: cali692a23c8bd5: Gained IPv6LL May 10 00:47:36.595660 kubelet[2056]: E0510 00:47:36.595471 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:36.605960 kubelet[2056]: I0510 00:47:36.605901 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-vczlc" podStartSLOduration=84.605884256 podStartE2EDuration="1m24.605884256s" podCreationTimestamp="2025-05-10 00:46:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:47:36.60549548 +0000 UTC m=+96.451234767" watchObservedRunningTime="2025-05-10 00:47:36.605884256 +0000 UTC m=+96.451623533" May 10 00:47:36.615000 audit[5258]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=5258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:36.615000 audit[5258]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdb9fffe70 a2=0 a3=7ffdb9fffe5c items=0 ppid=2252 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:36.620000 audit[5258]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_rule pid=5258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:36.620000 audit[5258]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffdb9fffe70 a2=0 a3=0 items=0 ppid=2252 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:36.805888 systemd-networkd[1021]: cali3ef2592474a: Gained IPv6LL May 10 00:47:37.509915 systemd-networkd[1021]: cali3fc977ecb2d: Gained IPv6LL May 10 00:47:37.599403 kubelet[2056]: E0510 00:47:37.599363 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:37.860000 audit[5260]: NETFILTER_CFG table=filter:114 family=2 entries=11 op=nft_register_rule pid=5260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:37.860000 audit[5260]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff48a6cfe0 a2=0 a3=7fff48a6cfcc items=0 ppid=2252 pid=5260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:37.867000 audit[5260]: NETFILTER_CFG table=nat:115 family=2 entries=37 op=nft_register_chain pid=5260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:37.867000 audit[5260]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7fff48a6cfe0 a2=0 a3=7fff48a6cfcc items=0 ppid=2252 pid=5260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:38.259538 env[1196]: time="2025-05-10T00:47:38.259411855Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.323 [INFO][5278] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.323 [INFO][5278] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" iface="eth0" netns="/var/run/netns/cni-7087afd8-b4f2-dcc7-6a1e-c90c545512b8" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.323 [INFO][5278] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" iface="eth0" netns="/var/run/netns/cni-7087afd8-b4f2-dcc7-6a1e-c90c545512b8" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.323 [INFO][5278] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" iface="eth0" netns="/var/run/netns/cni-7087afd8-b4f2-dcc7-6a1e-c90c545512b8" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.323 [INFO][5278] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.324 [INFO][5278] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.350 [INFO][5286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.350 [INFO][5286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.353 [INFO][5286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.359 [WARNING][5286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.359 [INFO][5286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.361 [INFO][5286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:38.364228 env[1196]: 2025-05-10 00:47:38.362 [INFO][5278] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:47:38.368873 env[1196]: time="2025-05-10T00:47:38.364448279Z" level=info msg="TearDown network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" successfully" May 10 00:47:38.368873 env[1196]: time="2025-05-10T00:47:38.364488245Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" returns successfully" May 10 00:47:38.368923 kubelet[2056]: E0510 00:47:38.367880 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:38.366860 systemd[1]: run-netns-cni\x2d7087afd8\x2db4f2\x2ddcc7\x2d6a1e\x2dc90c545512b8.mount: Deactivated successfully. May 10 00:47:38.369457 env[1196]: time="2025-05-10T00:47:38.369412656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-67xzr,Uid:a3d9b60d-7aa1-4633-8018-3b0a97709da2,Namespace:kube-system,Attempt:1,}" May 10 00:47:38.602737 kubelet[2056]: E0510 00:47:38.602352 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:38.978824 kubelet[2056]: I0510 00:47:38.978290 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:47:39.062517 systemd-networkd[1021]: calib6200c23051: Link UP May 10 00:47:39.085771 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:39.085953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib6200c23051: link becomes ready May 10 00:47:39.086228 systemd-networkd[1021]: calib6200c23051: Gained carrier May 10 00:47:39.843954 env[1196]: time="2025-05-10T00:47:39.843888122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:39.937000 audit[5329]: NETFILTER_CFG table=filter:116 family=2 entries=42 op=nft_register_chain pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:39.966420 kernel: kauditd_printk_skb: 311 callbacks suppressed May 10 00:47:39.966512 kernel: audit: type=1325 audit(1746838059.937:1464): table=filter:116 family=2 entries=42 op=nft_register_chain pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:39.937000 audit[5329]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7ffceed16c10 a2=0 a3=7ffceed16bfc items=0 ppid=4309 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.973921 kernel: audit: type=1300 audit(1746838059.937:1464): arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7ffceed16c10 a2=0 a3=7ffceed16bfc items=0 ppid=4309 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.974010 kernel: audit: type=1327 audit(1746838059.937:1464): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:39.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.565 [INFO][5295] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0 coredns-7db6d8ff4d- kube-system a3d9b60d-7aa1-4633-8018-3b0a97709da2 1241 0 2025-05-10 00:46:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-67xzr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib6200c23051 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.565 [INFO][5295] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.593 [INFO][5308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" HandleID="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.602 [INFO][5308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" HandleID="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314c60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-67xzr", "timestamp":"2025-05-10 00:47:38.593260767 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.602 [INFO][5308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.602 [INFO][5308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.602 [INFO][5308] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.605 [INFO][5308] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.653 [INFO][5308] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.662 [INFO][5308] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.668 [INFO][5308] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.671 [INFO][5308] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.671 [INFO][5308] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.673 [INFO][5308] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:38.750 [INFO][5308] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:39.057 [INFO][5308] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:39.058 [INFO][5308] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" host="localhost" May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:39.058 [INFO][5308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:39.980461 env[1196]: 2025-05-10 00:47:39.058 [INFO][5308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" HandleID="k8s-pod-network.b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.060 [INFO][5295] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a3d9b60d-7aa1-4633-8018-3b0a97709da2", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-67xzr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib6200c23051", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.060 [INFO][5295] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.061 [INFO][5295] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib6200c23051 ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.063 [INFO][5295] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.086 [INFO][5295] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a3d9b60d-7aa1-4633-8018-3b0a97709da2", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf", Pod:"coredns-7db6d8ff4d-67xzr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib6200c23051", MAC:"36:ef:6a:a9:ef:2e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:39.981122 env[1196]: 2025-05-10 00:47:39.978 [INFO][5295] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf" Namespace="kube-system" Pod="coredns-7db6d8ff4d-67xzr" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:47:39.985000 audit[5342]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:39.985000 audit[5342]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdee525110 a2=0 a3=7ffdee5250fc items=0 ppid=2252 pid=5342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.994614 kernel: audit: type=1325 audit(1746838059.985:1465): table=filter:117 family=2 entries=8 op=nft_register_rule pid=5342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:39.994719 kernel: audit: type=1300 audit(1746838059.985:1465): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdee525110 a2=0 a3=7ffdee5250fc items=0 ppid=2252 pid=5342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.994752 kernel: audit: type=1327 audit(1746838059.985:1465): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:39.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:40.009842 systemd[1]: Started sshd@22-10.0.0.118:22-10.0.0.1:58174.service. May 10 00:47:40.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:58174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:40.080742 kernel: audit: type=1130 audit(1746838060.009:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:58174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:40.093000 audit[5342]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=5342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:40.126509 env[1196]: time="2025-05-10T00:47:40.125920940Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:40.093000 audit[5342]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdee525110 a2=0 a3=7ffdee5250fc items=0 ppid=2252 pid=5342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.133214 kernel: audit: type=1325 audit(1746838060.093:1467): table=nat:118 family=2 entries=34 op=nft_register_chain pid=5342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:40.133271 kernel: audit: type=1300 audit(1746838060.093:1467): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdee525110 a2=0 a3=7ffdee5250fc items=0 ppid=2252 pid=5342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.133293 kernel: audit: type=1327 audit(1746838060.093:1467): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:40.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:40.140000 audit[5344]: USER_ACCT pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.141392 sshd[5344]: Accepted publickey for core from 10.0.0.1 port 58174 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:40.141000 audit[5344]: CRED_ACQ pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.141000 audit[5344]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39540160 a2=3 a3=0 items=0 ppid=1 pid=5344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:40.142634 sshd[5344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:40.146649 systemd-logind[1181]: New session 23 of user core. May 10 00:47:40.147808 systemd[1]: Started session-23.scope. May 10 00:47:40.150000 audit[5344]: USER_START pid=5344 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.151000 audit[5347]: CRED_ACQ pid=5347 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.252902 env[1196]: time="2025-05-10T00:47:40.252795520Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:40.252902 env[1196]: time="2025-05-10T00:47:40.252845444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:40.252902 env[1196]: time="2025-05-10T00:47:40.252864340Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:40.253180 env[1196]: time="2025-05-10T00:47:40.253111529Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf pid=5361 runtime=io.containerd.runc.v2 May 10 00:47:40.268551 systemd[1]: run-containerd-runc-k8s.io-b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf-runc.fASePI.mount: Deactivated successfully. May 10 00:47:40.272418 systemd[1]: Started cri-containerd-b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf.scope. May 10 00:47:40.278001 env[1196]: time="2025-05-10T00:47:40.277953038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.281000 audit: BPF prog-id=209 op=LOAD May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5361 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353465323864616665653335363835613435303938613137306666 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5361 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353465323864616665653335363835613435303938613137306666 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit: BPF prog-id=210 op=LOAD May 10 00:47:40.282000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000993a0 items=0 ppid=5361 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353465323864616665653335363835613435303938613137306666 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit: BPF prog-id=211 op=LOAD May 10 00:47:40.282000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000993e8 items=0 ppid=5361 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353465323864616665653335363835613435303938613137306666 May 10 00:47:40.282000 audit: BPF prog-id=211 op=UNLOAD May 10 00:47:40.282000 audit: BPF prog-id=210 op=UNLOAD May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:40.282000 audit: BPF prog-id=212 op=LOAD May 10 00:47:40.282000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000997f8 items=0 ppid=5361 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353465323864616665653335363835613435303938613137306666 May 10 00:47:40.283960 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:47:40.304949 env[1196]: time="2025-05-10T00:47:40.304901590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-67xzr,Uid:a3d9b60d-7aa1-4633-8018-3b0a97709da2,Namespace:kube-system,Attempt:1,} returns sandbox id \"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf\"" May 10 00:47:40.305753 kubelet[2056]: E0510 00:47:40.305718 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:40.312199 env[1196]: time="2025-05-10T00:47:40.312148030Z" level=info msg="CreateContainer within sandbox \"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:47:40.389913 env[1196]: time="2025-05-10T00:47:40.389824700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:40.390178 env[1196]: time="2025-05-10T00:47:40.390152190Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:47:40.390180 systemd-networkd[1021]: calib6200c23051: Gained IPv6LL May 10 00:47:40.393050 env[1196]: time="2025-05-10T00:47:40.393023321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:47:40.397975 env[1196]: time="2025-05-10T00:47:40.397949905Z" level=info msg="CreateContainer within sandbox \"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:47:40.606620 sshd[5344]: pam_unix(sshd:session): session closed for user core May 10 00:47:40.607000 audit[5344]: USER_END pid=5344 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.607000 audit[5344]: CRED_DISP pid=5344 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:40.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:58174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:40.609420 systemd[1]: sshd@22-10.0.0.118:22-10.0.0.1:58174.service: Deactivated successfully. May 10 00:47:40.610234 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:47:40.610961 systemd-logind[1181]: Session 23 logged out. Waiting for processes to exit. May 10 00:47:40.611687 systemd-logind[1181]: Removed session 23. May 10 00:47:41.046420 env[1196]: time="2025-05-10T00:47:41.046353302Z" level=info msg="CreateContainer within sandbox \"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"37ec8eebffd2ec52aa9bfd721501fa7e7dddc905a95b6f1e8bdbea4730c3d6fb\"" May 10 00:47:41.046980 env[1196]: time="2025-05-10T00:47:41.046934704Z" level=info msg="StartContainer for \"37ec8eebffd2ec52aa9bfd721501fa7e7dddc905a95b6f1e8bdbea4730c3d6fb\"" May 10 00:47:41.048365 env[1196]: time="2025-05-10T00:47:41.048322633Z" level=info msg="CreateContainer within sandbox \"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9788a835b8f234d28fd91c1a440c8d1957e328842b29255180738e160a9b6cc4\"" May 10 00:47:41.048870 env[1196]: time="2025-05-10T00:47:41.048835856Z" level=info msg="StartContainer for \"9788a835b8f234d28fd91c1a440c8d1957e328842b29255180738e160a9b6cc4\"" May 10 00:47:41.062166 systemd[1]: Started cri-containerd-37ec8eebffd2ec52aa9bfd721501fa7e7dddc905a95b6f1e8bdbea4730c3d6fb.scope. May 10 00:47:41.069053 systemd[1]: Started cri-containerd-9788a835b8f234d28fd91c1a440c8d1957e328842b29255180738e160a9b6cc4.scope. May 10 00:47:41.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.077000 audit: BPF prog-id=213 op=LOAD May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5361 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337656338656562666664326563353261613962666437323135303166 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5361 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337656338656562666664326563353261613962666437323135303166 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.080000 audit: BPF prog-id=214 op=LOAD May 10 00:47:41.080000 audit[5412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c2dc0 items=0 ppid=5361 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337656338656562666664326563353261613962666437323135303166 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit: BPF prog-id=215 op=LOAD May 10 00:47:41.081000 audit[5412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c2e08 items=0 ppid=5361 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337656338656562666664326563353261613962666437323135303166 May 10 00:47:41.081000 audit: BPF prog-id=215 op=UNLOAD May 10 00:47:41.081000 audit: BPF prog-id=214 op=UNLOAD May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { perfmon } for pid=5412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit[5412]: AVC avc: denied { bpf } for pid=5412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.081000 audit: BPF prog-id=216 op=LOAD May 10 00:47:41.081000 audit[5412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c3218 items=0 ppid=5361 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337656338656562666664326563353261613962666437323135303166 May 10 00:47:41.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit: BPF prog-id=217 op=LOAD May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=5095 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937383861383335623866323334643238666439316331613434306338 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=5095 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937383861383335623866323334643238666439316331613434306338 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit: BPF prog-id=218 op=LOAD May 10 00:47:41.095000 audit[5421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c00033c320 items=0 ppid=5095 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937383861383335623866323334643238666439316331613434306338 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.095000 audit: BPF prog-id=219 op=LOAD May 10 00:47:41.095000 audit[5421]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c00033c368 items=0 ppid=5095 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937383861383335623866323334643238666439316331613434306338 May 10 00:47:41.096000 audit: BPF prog-id=219 op=UNLOAD May 10 00:47:41.096000 audit: BPF prog-id=218 op=UNLOAD May 10 00:47:41.096000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { perfmon } for pid=5421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit[5421]: AVC avc: denied { bpf } for pid=5421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:41.096000 audit: BPF prog-id=220 op=LOAD May 10 00:47:41.096000 audit[5421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c00033c778 items=0 ppid=5095 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937383861383335623866323334643238666439316331613434306338 May 10 00:47:41.289402 env[1196]: time="2025-05-10T00:47:41.289306359Z" level=info msg="StartContainer for \"37ec8eebffd2ec52aa9bfd721501fa7e7dddc905a95b6f1e8bdbea4730c3d6fb\" returns successfully" May 10 00:47:41.382339 env[1196]: time="2025-05-10T00:47:41.382253538Z" level=info msg="StartContainer for \"9788a835b8f234d28fd91c1a440c8d1957e328842b29255180738e160a9b6cc4\" returns successfully" May 10 00:47:41.612230 kubelet[2056]: E0510 00:47:41.612181 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:41.650444 kubelet[2056]: I0510 00:47:41.650278 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-67xzr" podStartSLOduration=89.650258351 podStartE2EDuration="1m29.650258351s" podCreationTimestamp="2025-05-10 00:46:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:47:41.629066488 +0000 UTC m=+101.474805785" watchObservedRunningTime="2025-05-10 00:47:41.650258351 +0000 UTC m=+101.495997628" May 10 00:47:41.652000 audit[5495]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:41.652000 audit[5495]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc87654f90 a2=0 a3=7ffc87654f7c items=0 ppid=2252 pid=5495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:41.657000 audit[5495]: NETFILTER_CFG table=nat:120 family=2 entries=46 op=nft_register_rule pid=5495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:41.657000 audit[5495]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffc87654f90 a2=0 a3=7ffc87654f7c items=0 ppid=2252 pid=5495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:41.669000 audit[5497]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:41.669000 audit[5497]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde6c0c7e0 a2=0 a3=7ffde6c0c7cc items=0 ppid=2252 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:41.675000 audit[5497]: NETFILTER_CFG table=nat:122 family=2 entries=58 op=nft_register_chain pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:41.675000 audit[5497]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffde6c0c7e0 a2=0 a3=7ffde6c0c7cc items=0 ppid=2252 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:41.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:41.693082 kubelet[2056]: I0510 00:47:41.693006 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5d67d94876-ngbtx" podStartSLOduration=75.93969524 podStartE2EDuration="1m20.69298193s" podCreationTimestamp="2025-05-10 00:46:21 +0000 UTC" firstStartedPulling="2025-05-10 00:47:35.639075447 +0000 UTC m=+95.484814724" lastFinishedPulling="2025-05-10 00:47:40.392362127 +0000 UTC m=+100.238101414" observedRunningTime="2025-05-10 00:47:41.672798528 +0000 UTC m=+101.518537825" watchObservedRunningTime="2025-05-10 00:47:41.69298193 +0000 UTC m=+101.538721207" May 10 00:47:42.618060 kubelet[2056]: E0510 00:47:42.618008 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:43.619642 kubelet[2056]: E0510 00:47:43.619599 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:45.048994 env[1196]: time="2025-05-10T00:47:45.048939900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:45.251547 env[1196]: time="2025-05-10T00:47:45.251467246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:45.301243 env[1196]: time="2025-05-10T00:47:45.301113210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:45.343468 env[1196]: time="2025-05-10T00:47:45.343404319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:45.344250 env[1196]: time="2025-05-10T00:47:45.344207992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:47:45.347149 env[1196]: time="2025-05-10T00:47:45.347098669Z" level=info msg="CreateContainer within sandbox \"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:47:45.611730 systemd[1]: Started sshd@23-10.0.0.118:22-10.0.0.1:58186.service. May 10 00:47:45.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.118:22-10.0.0.1:58186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:45.612923 kernel: kauditd_printk_skb: 193 callbacks suppressed May 10 00:47:45.612967 kernel: audit: type=1130 audit(1746838065.611:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.118:22-10.0.0.1:58186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:45.652000 audit[5507]: USER_ACCT pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.653782 sshd[5507]: Accepted publickey for core from 10.0.0.1 port 58186 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:45.657000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.658493 sshd[5507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:45.662740 kernel: audit: type=1101 audit(1746838065.652:1535): pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.662850 kernel: audit: type=1103 audit(1746838065.657:1536): pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.662877 kernel: audit: type=1006 audit(1746838065.657:1537): pid=5507 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:47:45.662339 systemd-logind[1181]: New session 24 of user core. May 10 00:47:45.663164 systemd[1]: Started session-24.scope. May 10 00:47:45.657000 audit[5507]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea553ad0 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.670097 kernel: audit: type=1300 audit(1746838065.657:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea553ad0 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.670142 kernel: audit: type=1327 audit(1746838065.657:1537): proctitle=737368643A20636F7265205B707269765D May 10 00:47:45.657000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:45.671510 kernel: audit: type=1105 audit(1746838065.667:1538): pid=5507 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.667000 audit[5507]: USER_START pid=5507 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.668000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.684037 kernel: audit: type=1103 audit(1746838065.668:1539): pid=5509 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.705400 env[1196]: time="2025-05-10T00:47:45.705266904Z" level=info msg="CreateContainer within sandbox \"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6f2b13adf6e7a0096237c55c0769eaf52b17f9bcce3b56dbdd20ccb66c43102e\"" May 10 00:47:45.705999 env[1196]: time="2025-05-10T00:47:45.705962021Z" level=info msg="StartContainer for \"6f2b13adf6e7a0096237c55c0769eaf52b17f9bcce3b56dbdd20ccb66c43102e\"" May 10 00:47:45.730680 systemd[1]: Started cri-containerd-6f2b13adf6e7a0096237c55c0769eaf52b17f9bcce3b56dbdd20ccb66c43102e.scope. May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efe98ad0c38 items=0 ppid=4904 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.759056 kernel: audit: type=1400 audit(1746838065.741:1540): avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.759114 kernel: audit: type=1300 audit(1746838065.741:1540): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efe98ad0c38 items=0 ppid=4904 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326231336164663665376130303936323337633535633037363965 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.741000 audit: BPF prog-id=221 op=LOAD May 10 00:47:45.741000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000286ba8 items=0 ppid=4904 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326231336164663665376130303936323337633535633037363965 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.752000 audit: BPF prog-id=222 op=LOAD May 10 00:47:45.752000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000286bf8 items=0 ppid=4904 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326231336164663665376130303936323337633535633037363965 May 10 00:47:45.758000 audit: BPF prog-id=222 op=UNLOAD May 10 00:47:45.758000 audit: BPF prog-id=221 op=UNLOAD May 10 00:47:45.758000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:45.758000 audit: BPF prog-id=223 op=LOAD May 10 00:47:45.758000 audit[5519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000286c88 items=0 ppid=4904 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666326231336164663665376130303936323337633535633037363965 May 10 00:47:45.775501 env[1196]: time="2025-05-10T00:47:45.775448673Z" level=info msg="StartContainer for \"6f2b13adf6e7a0096237c55c0769eaf52b17f9bcce3b56dbdd20ccb66c43102e\" returns successfully" May 10 00:47:45.890887 sshd[5507]: pam_unix(sshd:session): session closed for user core May 10 00:47:45.891000 audit[5507]: USER_END pid=5507 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.891000 audit[5507]: CRED_DISP pid=5507 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.894698 systemd[1]: sshd@23-10.0.0.118:22-10.0.0.1:58186.service: Deactivated successfully. May 10 00:47:45.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.118:22-10.0.0.1:58186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:45.895497 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:47:45.897881 systemd-logind[1181]: Session 24 logged out. Waiting for processes to exit. May 10 00:47:45.900330 systemd[1]: Started sshd@24-10.0.0.118:22-10.0.0.1:58190.service. May 10 00:47:45.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.118:22-10.0.0.1:58190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:45.901763 systemd-logind[1181]: Removed session 24. May 10 00:47:45.939904 sshd[5560]: Accepted publickey for core from 10.0.0.1 port 58190 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:45.939000 audit[5560]: USER_ACCT pid=5560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.940000 audit[5560]: CRED_ACQ pid=5560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.940000 audit[5560]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd48870ec0 a2=3 a3=0 items=0 ppid=1 pid=5560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:45.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:45.941866 sshd[5560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:45.946688 systemd-logind[1181]: New session 25 of user core. May 10 00:47:45.947877 systemd[1]: Started session-25.scope. May 10 00:47:45.951000 audit[5560]: USER_START pid=5560 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:45.953000 audit[5562]: CRED_ACQ pid=5562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:46.371893 kubelet[2056]: I0510 00:47:46.371840 2056 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:47:46.371893 kubelet[2056]: I0510 00:47:46.371874 2056 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:47:46.909279 kubelet[2056]: I0510 00:47:46.909186 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6m6bf" podStartSLOduration=75.255719232 podStartE2EDuration="1m25.90916485s" podCreationTimestamp="2025-05-10 00:46:21 +0000 UTC" firstStartedPulling="2025-05-10 00:47:34.691845416 +0000 UTC m=+94.537584693" lastFinishedPulling="2025-05-10 00:47:45.345291034 +0000 UTC m=+105.191030311" observedRunningTime="2025-05-10 00:47:46.908641409 +0000 UTC m=+106.754380696" watchObservedRunningTime="2025-05-10 00:47:46.90916485 +0000 UTC m=+106.754904157" May 10 00:47:47.060464 sshd[5560]: pam_unix(sshd:session): session closed for user core May 10 00:47:47.060000 audit[5560]: USER_END pid=5560 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:47.061000 audit[5560]: CRED_DISP pid=5560 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:47.065254 systemd[1]: Started sshd@25-10.0.0.118:22-10.0.0.1:35962.service. May 10 00:47:47.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.118:22-10.0.0.1:35962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:47.065901 systemd[1]: sshd@24-10.0.0.118:22-10.0.0.1:58190.service: Deactivated successfully. May 10 00:47:47.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.118:22-10.0.0.1:58190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:47.066696 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:47:47.067413 systemd-logind[1181]: Session 25 logged out. Waiting for processes to exit. May 10 00:47:47.068642 systemd-logind[1181]: Removed session 25. May 10 00:47:47.104000 audit[5570]: USER_ACCT pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:47.105882 sshd[5570]: Accepted publickey for core from 10.0.0.1 port 35962 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:47.105000 audit[5570]: CRED_ACQ pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:47.106000 audit[5570]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7c2e9700 a2=3 a3=0 items=0 ppid=1 pid=5570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:47.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:47.106982 sshd[5570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:47.110955 systemd-logind[1181]: New session 26 of user core. May 10 00:47:47.112078 systemd[1]: Started session-26.scope. May 10 00:47:47.116000 audit[5570]: USER_START pid=5570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:47.117000 audit[5573]: CRED_ACQ pid=5573 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.792000 audit[5591]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:48.792000 audit[5591]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffea877bdd0 a2=0 a3=7ffea877bdbc items=0 ppid=2252 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:48.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:48.800000 audit[5591]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:48.800000 audit[5591]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea877bdd0 a2=0 a3=0 items=0 ppid=2252 pid=5591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:48.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:48.818000 audit[5593]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:48.818000 audit[5593]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdf4329b10 a2=0 a3=7ffdf4329afc items=0 ppid=2252 pid=5593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:48.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:48.820461 sshd[5570]: pam_unix(sshd:session): session closed for user core May 10 00:47:48.821000 audit[5570]: USER_END pid=5570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.821000 audit[5570]: CRED_DISP pid=5570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.824323 systemd[1]: Started sshd@26-10.0.0.118:22-10.0.0.1:35968.service. May 10 00:47:48.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.118:22-10.0.0.1:35968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:48.823000 audit[5593]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5593 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:48.823000 audit[5593]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdf4329b10 a2=0 a3=0 items=0 ppid=2252 pid=5593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:48.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:48.825585 systemd[1]: sshd@25-10.0.0.118:22-10.0.0.1:35962.service: Deactivated successfully. May 10 00:47:48.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.118:22-10.0.0.1:35962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:48.826403 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:47:48.827611 systemd-logind[1181]: Session 26 logged out. Waiting for processes to exit. May 10 00:47:48.828591 systemd-logind[1181]: Removed session 26. May 10 00:47:48.863427 sshd[5595]: Accepted publickey for core from 10.0.0.1 port 35968 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:48.862000 audit[5595]: USER_ACCT pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.864000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.864000 audit[5595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff58575530 a2=3 a3=0 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:48.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:48.865296 sshd[5595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:48.871213 systemd-logind[1181]: New session 27 of user core. May 10 00:47:48.871638 systemd[1]: Started session-27.scope. May 10 00:47:48.876000 audit[5595]: USER_START pid=5595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:48.878000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.272931 sshd[5595]: pam_unix(sshd:session): session closed for user core May 10 00:47:49.273000 audit[5595]: USER_END pid=5595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.274000 audit[5595]: CRED_DISP pid=5595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.277904 systemd[1]: Started sshd@27-10.0.0.118:22-10.0.0.1:35976.service. May 10 00:47:49.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.118:22-10.0.0.1:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:49.279000 systemd[1]: sshd@26-10.0.0.118:22-10.0.0.1:35968.service: Deactivated successfully. May 10 00:47:49.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.118:22-10.0.0.1:35968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:49.279930 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:47:49.281783 systemd-logind[1181]: Session 27 logged out. Waiting for processes to exit. May 10 00:47:49.285120 systemd-logind[1181]: Removed session 27. May 10 00:47:49.318000 audit[5613]: USER_ACCT pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.320104 sshd[5613]: Accepted publickey for core from 10.0.0.1 port 35976 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:49.320000 audit[5613]: CRED_ACQ pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.320000 audit[5613]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5f51060 a2=3 a3=0 items=0 ppid=1 pid=5613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:49.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:49.321253 sshd[5613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:49.327518 systemd[1]: Started session-28.scope. May 10 00:47:49.328246 systemd-logind[1181]: New session 28 of user core. May 10 00:47:49.333000 audit[5613]: USER_START pid=5613 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.335000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.471532 sshd[5613]: pam_unix(sshd:session): session closed for user core May 10 00:47:49.472000 audit[5613]: USER_END pid=5613 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.472000 audit[5613]: CRED_DISP pid=5613 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:49.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.118:22-10.0.0.1:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:49.474840 systemd[1]: sshd@27-10.0.0.118:22-10.0.0.1:35976.service: Deactivated successfully. May 10 00:47:49.475877 systemd[1]: session-28.scope: Deactivated successfully. May 10 00:47:49.476611 systemd-logind[1181]: Session 28 logged out. Waiting for processes to exit. May 10 00:47:49.477641 systemd-logind[1181]: Removed session 28. May 10 00:47:53.099466 kubelet[2056]: E0510 00:47:53.099425 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:54.058000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.060412 kernel: kauditd_printk_skb: 100 callbacks suppressed May 10 00:47:54.060599 kernel: audit: type=1400 audit(1746838074.058:1589): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.058000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.078609 kernel: audit: type=1400 audit(1746838074.058:1590): avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.078803 kernel: audit: type=1300 audit(1746838074.058:1590): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00243e150 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:54.058000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00243e150 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:54.083498 kernel: audit: type=1327 audit(1746838074.058:1590): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:54.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:54.089242 kernel: audit: type=1300 audit(1746838074.058:1589): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a720e0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:54.058000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a720e0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:54.094169 kernel: audit: type=1327 audit(1746838074.058:1589): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:54.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:54.476658 systemd[1]: Started sshd@28-10.0.0.118:22-10.0.0.1:35984.service. May 10 00:47:54.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:54.481734 kernel: audit: type=1130 audit(1746838074.476:1591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:54.516000 audit[5654]: USER_ACCT pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.517810 sshd[5654]: Accepted publickey for core from 10.0.0.1 port 35984 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:54.520107 sshd[5654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:54.519000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.524232 systemd-logind[1181]: New session 29 of user core. May 10 00:47:54.524575 systemd[1]: Started session-29.scope. May 10 00:47:54.527598 kernel: audit: type=1101 audit(1746838074.516:1592): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.527667 kernel: audit: type=1103 audit(1746838074.519:1593): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.527736 kernel: audit: type=1006 audit(1746838074.519:1594): pid=5654 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 10 00:47:54.519000 audit[5654]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26f69f60 a2=3 a3=0 items=0 ppid=1 pid=5654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:54.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:54.528000 audit[5654]: USER_START pid=5654 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.529000 audit[5658]: CRED_ACQ pid=5658 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.639443 sshd[5654]: pam_unix(sshd:session): session closed for user core May 10 00:47:54.639000 audit[5654]: USER_END pid=5654 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.640000 audit[5654]: CRED_DISP pid=5654 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:54.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:54.642182 systemd[1]: sshd@28-10.0.0.118:22-10.0.0.1:35984.service: Deactivated successfully. May 10 00:47:54.643106 systemd[1]: session-29.scope: Deactivated successfully. May 10 00:47:54.644007 systemd-logind[1181]: Session 29 logged out. Waiting for processes to exit. May 10 00:47:54.644793 systemd-logind[1181]: Removed session 29. May 10 00:47:54.895000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.895000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.895000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c017192b70 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.895000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.895000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:54.895000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c010caa1c0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.895000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c017422990 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:54.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:54.895000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.895000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c010c79b40 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:54.895000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c017430270 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:54.896000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:54.896000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0174302a0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c290 key=(null) May 10 00:47:54.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:58.357000 audit[5669]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:58.357000 audit[5669]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd3f766400 a2=0 a3=7ffd3f7663ec items=0 ppid=2252 pid=5669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:58.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:58.363000 audit[5669]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:58.363000 audit[5669]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd3f766400 a2=0 a3=7ffd3f7663ec items=0 ppid=2252 pid=5669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:58.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001825480 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018254a0 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:58.987000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010f5740 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:58.987000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a73d80 a2=fc6 a3=0 items=0 ppid=1770 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c116,c194 key=(null) May 10 00:47:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:59.645902 systemd[1]: Started sshd@29-10.0.0.118:22-10.0.0.1:40778.service. May 10 00:47:59.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:59.647997 kernel: kauditd_printk_skb: 43 callbacks suppressed May 10 00:47:59.648053 kernel: audit: type=1130 audit(1746838079.644:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:59.685000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.687922 sshd[5673]: Accepted publickey for core from 10.0.0.1 port 40778 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:47:59.690497 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:59.688000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.696788 systemd-logind[1181]: New session 30 of user core. May 10 00:47:59.697275 systemd[1]: Started session-30.scope. May 10 00:47:59.698471 kernel: audit: type=1101 audit(1746838079.685:1613): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.698610 kernel: audit: type=1103 audit(1746838079.688:1614): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.698674 kernel: audit: type=1006 audit(1746838079.688:1615): pid=5673 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 10 00:47:59.688000 audit[5673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0184fce0 a2=3 a3=0 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:59.707276 kernel: audit: type=1300 audit(1746838079.688:1615): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0184fce0 a2=3 a3=0 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:59.707350 kernel: audit: type=1327 audit(1746838079.688:1615): proctitle=737368643A20636F7265205B707269765D May 10 00:47:59.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:59.703000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.704000 audit[5675]: CRED_ACQ pid=5675 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.723135 kernel: audit: type=1105 audit(1746838079.703:1616): pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.723209 kernel: audit: type=1103 audit(1746838079.704:1617): pid=5675 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.819781 sshd[5673]: pam_unix(sshd:session): session closed for user core May 10 00:47:59.819000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.822422 systemd[1]: sshd@29-10.0.0.118:22-10.0.0.1:40778.service: Deactivated successfully. May 10 00:47:59.823257 systemd[1]: session-30.scope: Deactivated successfully. May 10 00:47:59.823850 systemd-logind[1181]: Session 30 logged out. Waiting for processes to exit. May 10 00:47:59.824635 systemd-logind[1181]: Removed session 30. May 10 00:47:59.819000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.830470 kernel: audit: type=1106 audit(1746838079.819:1618): pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.830533 kernel: audit: type=1104 audit(1746838079.819:1619): pid=5673 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:59.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:00.294876 env[1196]: time="2025-05-10T00:48:00.294822382Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.369 [WARNING][5704] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a3d9b60d-7aa1-4633-8018-3b0a97709da2", ResourceVersion:"1274", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf", Pod:"coredns-7db6d8ff4d-67xzr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib6200c23051", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.369 [INFO][5704] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.370 [INFO][5704] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" iface="eth0" netns="" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.370 [INFO][5704] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.370 [INFO][5704] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.401 [INFO][5712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.401 [INFO][5712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.401 [INFO][5712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.408 [WARNING][5712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.408 [INFO][5712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.410 [INFO][5712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.414061 env[1196]: 2025-05-10 00:48:00.412 [INFO][5704] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.414685 env[1196]: time="2025-05-10T00:48:00.414612017Z" level=info msg="TearDown network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" successfully" May 10 00:48:00.414685 env[1196]: time="2025-05-10T00:48:00.414676308Z" level=info msg="StopPodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" returns successfully" May 10 00:48:00.433876 env[1196]: time="2025-05-10T00:48:00.433808472Z" level=info msg="RemovePodSandbox for \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:48:00.433876 env[1196]: time="2025-05-10T00:48:00.433860461Z" level=info msg="Forcibly stopping sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\"" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.468 [WARNING][5736] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a3d9b60d-7aa1-4633-8018-3b0a97709da2", ResourceVersion:"1274", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b054e28dafee35685a45098a170ff127668441c1a6c5fc6ec7f45ff23ea430cf", Pod:"coredns-7db6d8ff4d-67xzr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib6200c23051", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.468 [INFO][5736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.468 [INFO][5736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" iface="eth0" netns="" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.468 [INFO][5736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.468 [INFO][5736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.488 [INFO][5744] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.488 [INFO][5744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.488 [INFO][5744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.493 [WARNING][5744] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.493 [INFO][5744] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" HandleID="k8s-pod-network.37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" Workload="localhost-k8s-coredns--7db6d8ff4d--67xzr-eth0" May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.495 [INFO][5744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.499967 env[1196]: 2025-05-10 00:48:00.497 [INFO][5736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f" May 10 00:48:00.500797 env[1196]: time="2025-05-10T00:48:00.499978509Z" level=info msg="TearDown network for sandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" successfully" May 10 00:48:00.638171 env[1196]: time="2025-05-10T00:48:00.638108808Z" level=info msg="RemovePodSandbox \"37db8db0c641fe58908918b9be7d1255759444ea9b015db4757a19a2baf52c6f\" returns successfully" May 10 00:48:00.638818 env[1196]: time="2025-05-10T00:48:00.638781903Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.678 [WARNING][5770] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"da224529-209a-4c8a-9fe1-7dadb25d5795", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67", Pod:"calico-apiserver-568d49455f-pwpxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid89a10b31d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.678 [INFO][5770] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.678 [INFO][5770] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" iface="eth0" netns="" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.678 [INFO][5770] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.678 [INFO][5770] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.696 [INFO][5778] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.696 [INFO][5778] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.697 [INFO][5778] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.701 [WARNING][5778] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.702 [INFO][5778] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.703 [INFO][5778] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.705837 env[1196]: 2025-05-10 00:48:00.704 [INFO][5770] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.706331 env[1196]: time="2025-05-10T00:48:00.705868786Z" level=info msg="TearDown network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" successfully" May 10 00:48:00.706331 env[1196]: time="2025-05-10T00:48:00.705904814Z" level=info msg="StopPodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" returns successfully" May 10 00:48:00.706396 env[1196]: time="2025-05-10T00:48:00.706369104Z" level=info msg="RemovePodSandbox for \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:48:00.706464 env[1196]: time="2025-05-10T00:48:00.706400483Z" level=info msg="Forcibly stopping sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\"" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.734 [WARNING][5801] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"da224529-209a-4c8a-9fe1-7dadb25d5795", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1132d3b96a92835781b55fd87a2d53e92ea1c8108f70872b0750b16f90c7da67", Pod:"calico-apiserver-568d49455f-pwpxx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid89a10b31d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.735 [INFO][5801] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.735 [INFO][5801] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" iface="eth0" netns="" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.735 [INFO][5801] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.735 [INFO][5801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.755 [INFO][5809] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.755 [INFO][5809] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.755 [INFO][5809] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.761 [WARNING][5809] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.761 [INFO][5809] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" HandleID="k8s-pod-network.e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" Workload="localhost-k8s-calico--apiserver--568d49455f--pwpxx-eth0" May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.763 [INFO][5809] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.765849 env[1196]: 2025-05-10 00:48:00.764 [INFO][5801] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf" May 10 00:48:00.766444 env[1196]: time="2025-05-10T00:48:00.765886211Z" level=info msg="TearDown network for sandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" successfully" May 10 00:48:00.794036 env[1196]: time="2025-05-10T00:48:00.793989915Z" level=info msg="RemovePodSandbox \"e20193e56e3be58fae27e23b215025b36c5b9532d262f9973bd1847afa6768cf\" returns successfully" May 10 00:48:00.794470 env[1196]: time="2025-05-10T00:48:00.794429859Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.824 [WARNING][5832] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"4302ba5e-ada9-449b-ab80-c3e958906fb4", ResourceVersion:"1249", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431", Pod:"calico-apiserver-568d49455f-7jch4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80c1f219ebd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.824 [INFO][5832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.824 [INFO][5832] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" iface="eth0" netns="" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.824 [INFO][5832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.824 [INFO][5832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.842 [INFO][5840] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.842 [INFO][5840] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.842 [INFO][5840] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.846 [WARNING][5840] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.847 [INFO][5840] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.848 [INFO][5840] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.850994 env[1196]: 2025-05-10 00:48:00.849 [INFO][5832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.851466 env[1196]: time="2025-05-10T00:48:00.851063785Z" level=info msg="TearDown network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" successfully" May 10 00:48:00.851466 env[1196]: time="2025-05-10T00:48:00.851108800Z" level=info msg="StopPodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" returns successfully" May 10 00:48:00.851629 env[1196]: time="2025-05-10T00:48:00.851603988Z" level=info msg="RemovePodSandbox for \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:48:00.851679 env[1196]: time="2025-05-10T00:48:00.851636269Z" level=info msg="Forcibly stopping sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\"" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.880 [WARNING][5863] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0", GenerateName:"calico-apiserver-568d49455f-", Namespace:"calico-apiserver", SelfLink:"", UID:"4302ba5e-ada9-449b-ab80-c3e958906fb4", ResourceVersion:"1249", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"568d49455f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da165225c5795ba6189376f03e1397e78a45dbeb3e390b6457f3e54371fea431", Pod:"calico-apiserver-568d49455f-7jch4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80c1f219ebd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.881 [INFO][5863] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.881 [INFO][5863] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" iface="eth0" netns="" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.881 [INFO][5863] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.881 [INFO][5863] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.900 [INFO][5872] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.900 [INFO][5872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.900 [INFO][5872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.906 [WARNING][5872] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.906 [INFO][5872] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" HandleID="k8s-pod-network.088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" Workload="localhost-k8s-calico--apiserver--568d49455f--7jch4-eth0" May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.907 [INFO][5872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.910196 env[1196]: 2025-05-10 00:48:00.908 [INFO][5863] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68" May 10 00:48:00.910196 env[1196]: time="2025-05-10T00:48:00.910173571Z" level=info msg="TearDown network for sandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" successfully" May 10 00:48:00.913678 env[1196]: time="2025-05-10T00:48:00.913649013Z" level=info msg="RemovePodSandbox \"088c66ecad75f88d239ec85d7abcd9a32b2d8cb18d72e16503fad89ddd4abc68\" returns successfully" May 10 00:48:00.914260 env[1196]: time="2025-05-10T00:48:00.914222999Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.946 [WARNING][5895] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6m6bf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d85926ec-2929-465e-88c7-112e20f322a9", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e", Pod:"csi-node-driver-6m6bf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali692a23c8bd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.946 [INFO][5895] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.946 [INFO][5895] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" iface="eth0" netns="" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.946 [INFO][5895] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.946 [INFO][5895] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.965 [INFO][5904] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.965 [INFO][5904] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.965 [INFO][5904] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.970 [WARNING][5904] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.971 [INFO][5904] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.972 [INFO][5904] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:00.975268 env[1196]: 2025-05-10 00:48:00.973 [INFO][5895] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:00.975780 env[1196]: time="2025-05-10T00:48:00.975297737Z" level=info msg="TearDown network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" successfully" May 10 00:48:00.975780 env[1196]: time="2025-05-10T00:48:00.975327012Z" level=info msg="StopPodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" returns successfully" May 10 00:48:00.975867 env[1196]: time="2025-05-10T00:48:00.975842327Z" level=info msg="RemovePodSandbox for \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:48:00.975916 env[1196]: time="2025-05-10T00:48:00.975869960Z" level=info msg="Forcibly stopping sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\"" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.008 [WARNING][5930] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6m6bf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d85926ec-2929-465e-88c7-112e20f322a9", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f6ca8322ecaf8e2d3ecf4de0378d7dbf2e2aa642cf4c4af8f34614c520218e", Pod:"csi-node-driver-6m6bf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali692a23c8bd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.009 [INFO][5930] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.009 [INFO][5930] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" iface="eth0" netns="" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.009 [INFO][5930] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.009 [INFO][5930] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.044 [INFO][5939] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.044 [INFO][5939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.044 [INFO][5939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.050 [WARNING][5939] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.050 [INFO][5939] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" HandleID="k8s-pod-network.a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" Workload="localhost-k8s-csi--node--driver--6m6bf-eth0" May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.051 [INFO][5939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:01.054280 env[1196]: 2025-05-10 00:48:01.052 [INFO][5930] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe" May 10 00:48:01.054876 env[1196]: time="2025-05-10T00:48:01.054316034Z" level=info msg="TearDown network for sandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" successfully" May 10 00:48:01.058239 env[1196]: time="2025-05-10T00:48:01.058206472Z" level=info msg="RemovePodSandbox \"a16b8f20696b3f4ae3304d802c9c688aec1941bad6f7b2f2f5933c2469c51abe\" returns successfully" May 10 00:48:01.058787 env[1196]: time="2025-05-10T00:48:01.058752977Z" level=info msg="StopPodSandbox for \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\"" May 10 00:48:01.059000 env[1196]: time="2025-05-10T00:48:01.058821266Z" level=info msg="TearDown network for sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" successfully" May 10 00:48:01.059000 env[1196]: time="2025-05-10T00:48:01.058854339Z" level=info msg="StopPodSandbox for \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" returns successfully" May 10 00:48:01.059089 env[1196]: time="2025-05-10T00:48:01.059066802Z" level=info msg="RemovePodSandbox for \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\"" May 10 00:48:01.059129 env[1196]: time="2025-05-10T00:48:01.059085637Z" level=info msg="Forcibly stopping sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\"" May 10 00:48:01.059164 env[1196]: time="2025-05-10T00:48:01.059133358Z" level=info msg="TearDown network for sandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" successfully" May 10 00:48:01.062954 env[1196]: time="2025-05-10T00:48:01.062910110Z" level=info msg="RemovePodSandbox \"79e811ff5d76cba98ce5744420c5d096cd3f34348203fa08dde9e4286f640d01\" returns successfully" May 10 00:48:01.063207 env[1196]: time="2025-05-10T00:48:01.063182275Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.094 [WARNING][5962] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0", GenerateName:"calico-kube-controllers-5d67d94876-", Namespace:"calico-system", SelfLink:"", UID:"65a67f7d-1937-4f82-aa43-01aa3ce567af", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d67d94876", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49", Pod:"calico-kube-controllers-5d67d94876-ngbtx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ef2592474a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.095 [INFO][5962] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.095 [INFO][5962] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" iface="eth0" netns="" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.095 [INFO][5962] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.096 [INFO][5962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.112 [INFO][5971] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.113 [INFO][5971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.113 [INFO][5971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.118 [WARNING][5971] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.118 [INFO][5971] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.119 [INFO][5971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:01.121987 env[1196]: 2025-05-10 00:48:01.120 [INFO][5962] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.122697 env[1196]: time="2025-05-10T00:48:01.122651960Z" level=info msg="TearDown network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" successfully" May 10 00:48:01.122697 env[1196]: time="2025-05-10T00:48:01.122688229Z" level=info msg="StopPodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" returns successfully" May 10 00:48:01.123174 env[1196]: time="2025-05-10T00:48:01.123150344Z" level=info msg="RemovePodSandbox for \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:48:01.123224 env[1196]: time="2025-05-10T00:48:01.123181403Z" level=info msg="Forcibly stopping sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\"" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.153 [WARNING][5994] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0", GenerateName:"calico-kube-controllers-5d67d94876-", Namespace:"calico-system", SelfLink:"", UID:"65a67f7d-1937-4f82-aa43-01aa3ce567af", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d67d94876", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42bb22f93b32a668bc30c6ee081b1e3401707f760366d5c901f165e8b9ba3d49", Pod:"calico-kube-controllers-5d67d94876-ngbtx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ef2592474a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.153 [INFO][5994] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.153 [INFO][5994] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" iface="eth0" netns="" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.153 [INFO][5994] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.153 [INFO][5994] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.170 [INFO][6003] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.171 [INFO][6003] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.171 [INFO][6003] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.175 [WARNING][6003] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.175 [INFO][6003] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" HandleID="k8s-pod-network.204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" Workload="localhost-k8s-calico--kube--controllers--5d67d94876--ngbtx-eth0" May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.176 [INFO][6003] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:01.179229 env[1196]: 2025-05-10 00:48:01.177 [INFO][5994] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727" May 10 00:48:01.180304 env[1196]: time="2025-05-10T00:48:01.179414720Z" level=info msg="TearDown network for sandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" successfully" May 10 00:48:01.182988 env[1196]: time="2025-05-10T00:48:01.182965654Z" level=info msg="RemovePodSandbox \"204e48030b52adeba99b757a0e2846c05b00781b6d6b2096eaf5b98e7e742727\" returns successfully" May 10 00:48:01.183504 env[1196]: time="2025-05-10T00:48:01.183477704Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.222 [WARNING][6026] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ba49d75b-6d9b-4b78-a4a9-bbbecf477921", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b", Pod:"coredns-7db6d8ff4d-vczlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3fc977ecb2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.222 [INFO][6026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.222 [INFO][6026] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" iface="eth0" netns="" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.223 [INFO][6026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.223 [INFO][6026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.240 [INFO][6035] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.241 [INFO][6035] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.241 [INFO][6035] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.249 [WARNING][6035] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.249 [INFO][6035] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.251 [INFO][6035] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:01.254285 env[1196]: 2025-05-10 00:48:01.252 [INFO][6026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.254821 env[1196]: time="2025-05-10T00:48:01.254316902Z" level=info msg="TearDown network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" successfully" May 10 00:48:01.254821 env[1196]: time="2025-05-10T00:48:01.254348922Z" level=info msg="StopPodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" returns successfully" May 10 00:48:01.254979 env[1196]: time="2025-05-10T00:48:01.254918311Z" level=info msg="RemovePodSandbox for \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:48:01.255030 env[1196]: time="2025-05-10T00:48:01.254982843Z" level=info msg="Forcibly stopping sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\"" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.285 [WARNING][6059] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ba49d75b-6d9b-4b78-a4a9-bbbecf477921", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ba6cf6f421494c401d110f04a026183d624e0b3ea110e5045c128929d008e95b", Pod:"coredns-7db6d8ff4d-vczlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3fc977ecb2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.286 [INFO][6059] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.286 [INFO][6059] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" iface="eth0" netns="" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.286 [INFO][6059] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.286 [INFO][6059] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.308 [INFO][6068] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.308 [INFO][6068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.308 [INFO][6068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.313 [WARNING][6068] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.313 [INFO][6068] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" HandleID="k8s-pod-network.5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" Workload="localhost-k8s-coredns--7db6d8ff4d--vczlc-eth0" May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.314 [INFO][6068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:48:01.318234 env[1196]: 2025-05-10 00:48:01.316 [INFO][6059] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35" May 10 00:48:01.319417 env[1196]: time="2025-05-10T00:48:01.318271790Z" level=info msg="TearDown network for sandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" successfully" May 10 00:48:01.322268 env[1196]: time="2025-05-10T00:48:01.322231760Z" level=info msg="RemovePodSandbox \"5e604ece30ac002ede4e323f264acd6d623f1eee8e805a0a813977ac65da3e35\" returns successfully" May 10 00:48:04.824215 systemd[1]: Started sshd@30-10.0.0.118:22-10.0.0.1:40784.service. May 10 00:48:04.830237 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:48:04.830282 kernel: audit: type=1130 audit(1746838084.822:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:04.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:04.862000 audit[6076]: USER_ACCT pid=6076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.864100 sshd[6076]: Accepted publickey for core from 10.0.0.1 port 40784 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:48:04.866975 sshd[6076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:04.872507 systemd-logind[1181]: New session 31 of user core. May 10 00:48:04.872671 systemd[1]: Started session-31.scope. May 10 00:48:04.873978 kernel: audit: type=1101 audit(1746838084.862:1622): pid=6076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.874143 kernel: audit: type=1103 audit(1746838084.864:1623): pid=6076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.864000 audit[6076]: CRED_ACQ pid=6076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.880830 kernel: audit: type=1006 audit(1746838084.864:1624): pid=6076 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 10 00:48:04.880896 kernel: audit: type=1300 audit(1746838084.864:1624): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcdaa07d0 a2=3 a3=0 items=0 ppid=1 pid=6076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:04.864000 audit[6076]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcdaa07d0 a2=3 a3=0 items=0 ppid=1 pid=6076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:04.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:48:04.886601 kernel: audit: type=1327 audit(1746838084.864:1624): proctitle=737368643A20636F7265205B707269765D May 10 00:48:04.886648 kernel: audit: type=1105 audit(1746838084.876:1625): pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.876000 audit[6076]: USER_START pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.891427 kernel: audit: type=1103 audit(1746838084.877:1626): pid=6078 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:04.877000 audit[6078]: CRED_ACQ pid=6078 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:05.008735 sshd[6076]: pam_unix(sshd:session): session closed for user core May 10 00:48:05.007000 audit[6076]: USER_END pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:05.011075 systemd[1]: sshd@30-10.0.0.118:22-10.0.0.1:40784.service: Deactivated successfully. May 10 00:48:05.011800 systemd[1]: session-31.scope: Deactivated successfully. May 10 00:48:05.012328 systemd-logind[1181]: Session 31 logged out. Waiting for processes to exit. May 10 00:48:05.013086 systemd-logind[1181]: Removed session 31. May 10 00:48:05.007000 audit[6076]: CRED_DISP pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:05.030532 kernel: audit: type=1106 audit(1746838085.007:1627): pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:05.030581 kernel: audit: type=1104 audit(1746838085.007:1628): pid=6076 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:05.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:10.014347 systemd[1]: Started sshd@31-10.0.0.118:22-10.0.0.1:35552.service. May 10 00:48:10.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.118:22-10.0.0.1:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:10.015906 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:48:10.015970 kernel: audit: type=1130 audit(1746838090.012:1630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.118:22-10.0.0.1:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:10.051000 audit[6095]: USER_ACCT pid=6095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.053022 sshd[6095]: Accepted publickey for core from 10.0.0.1 port 35552 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:48:10.055000 audit[6095]: CRED_ACQ pid=6095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.057521 sshd[6095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:10.061221 kernel: audit: type=1101 audit(1746838090.051:1631): pid=6095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.061307 kernel: audit: type=1103 audit(1746838090.055:1632): pid=6095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.061344 kernel: audit: type=1006 audit(1746838090.055:1633): pid=6095 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 May 10 00:48:10.063967 kernel: audit: type=1300 audit(1746838090.055:1633): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa0ef1520 a2=3 a3=0 items=0 ppid=1 pid=6095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:10.055000 audit[6095]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa0ef1520 a2=3 a3=0 items=0 ppid=1 pid=6095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:10.063619 systemd-logind[1181]: New session 32 of user core. May 10 00:48:10.064651 systemd[1]: Started session-32.scope. May 10 00:48:10.069502 kernel: audit: type=1327 audit(1746838090.055:1633): proctitle=737368643A20636F7265205B707269765D May 10 00:48:10.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:48:10.067000 audit[6095]: USER_START pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.069000 audit[6097]: CRED_ACQ pid=6097 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.078620 kernel: audit: type=1105 audit(1746838090.067:1634): pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.078685 kernel: audit: type=1103 audit(1746838090.069:1635): pid=6097 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.177722 sshd[6095]: pam_unix(sshd:session): session closed for user core May 10 00:48:10.176000 audit[6095]: USER_END pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.180571 systemd[1]: sshd@31-10.0.0.118:22-10.0.0.1:35552.service: Deactivated successfully. May 10 00:48:10.181423 systemd[1]: session-32.scope: Deactivated successfully. May 10 00:48:10.182111 systemd-logind[1181]: Session 32 logged out. Waiting for processes to exit. May 10 00:48:10.183045 systemd-logind[1181]: Removed session 32. May 10 00:48:10.177000 audit[6095]: CRED_DISP pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.187335 kernel: audit: type=1106 audit(1746838090.176:1636): pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.187386 kernel: audit: type=1104 audit(1746838090.177:1637): pid=6095 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:10.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.118:22-10.0.0.1:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:10.594607 systemd[1]: run-containerd-runc-k8s.io-9788a835b8f234d28fd91c1a440c8d1957e328842b29255180738e160a9b6cc4-runc.b4cZhT.mount: Deactivated successfully. May 10 00:48:15.182908 systemd[1]: Started sshd@32-10.0.0.118:22-10.0.0.1:35562.service. May 10 00:48:15.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.118:22-10.0.0.1:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:15.184235 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:48:15.184266 kernel: audit: type=1130 audit(1746838095.182:1639): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.118:22-10.0.0.1:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:15.230000 audit[6133]: USER_ACCT pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.231440 sshd[6133]: Accepted publickey for core from 10.0.0.1 port 35562 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:48:15.233135 sshd[6133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:15.237329 systemd[1]: Started session-33.scope. May 10 00:48:15.237812 systemd-logind[1181]: New session 33 of user core. May 10 00:48:15.232000 audit[6133]: CRED_ACQ pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.267444 kernel: audit: type=1101 audit(1746838095.230:1640): pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.267495 kernel: audit: type=1103 audit(1746838095.232:1641): pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.267521 kernel: audit: type=1006 audit(1746838095.232:1642): pid=6133 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 May 10 00:48:15.232000 audit[6133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1ca96580 a2=3 a3=0 items=0 ppid=1 pid=6133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:15.273876 kernel: audit: type=1300 audit(1746838095.232:1642): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1ca96580 a2=3 a3=0 items=0 ppid=1 pid=6133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:15.273923 kernel: audit: type=1327 audit(1746838095.232:1642): proctitle=737368643A20636F7265205B707269765D May 10 00:48:15.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:48:15.275226 kernel: audit: type=1105 audit(1746838095.242:1643): pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.242000 audit[6133]: USER_START pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.279520 kernel: audit: type=1103 audit(1746838095.244:1644): pid=6135 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.244000 audit[6135]: CRED_ACQ pid=6135 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.367806 sshd[6133]: pam_unix(sshd:session): session closed for user core May 10 00:48:15.368000 audit[6133]: USER_END pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.370662 systemd[1]: sshd@32-10.0.0.118:22-10.0.0.1:35562.service: Deactivated successfully. May 10 00:48:15.371421 systemd[1]: session-33.scope: Deactivated successfully. May 10 00:48:15.368000 audit[6133]: CRED_DISP pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.374182 systemd-logind[1181]: Session 33 logged out. Waiting for processes to exit. May 10 00:48:15.374908 systemd-logind[1181]: Removed session 33. May 10 00:48:15.377017 kernel: audit: type=1106 audit(1746838095.368:1645): pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.377086 kernel: audit: type=1104 audit(1746838095.368:1646): pid=6133 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:48:15.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.118:22-10.0.0.1:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'