May 8 00:51:23.721476 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 8 00:51:23.721495 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed May 7 23:24:31 -00 2025 May 8 00:51:23.721503 kernel: efi: EFI v2.70 by EDK II May 8 00:51:23.721508 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 8 00:51:23.721513 kernel: random: crng init done May 8 00:51:23.721519 kernel: ACPI: Early table checksum verification disabled May 8 00:51:23.721525 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 8 00:51:23.721531 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 8 00:51:23.721537 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721542 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721547 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721553 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721558 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721563 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721571 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721577 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721583 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:51:23.721588 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 8 00:51:23.721597 kernel: NUMA: Failed to initialise from firmware May 8 00:51:23.721604 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:51:23.721609 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 8 00:51:23.721615 kernel: Zone ranges: May 8 00:51:23.721620 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:51:23.721627 kernel: DMA32 empty May 8 00:51:23.721633 kernel: Normal empty May 8 00:51:23.721638 kernel: Movable zone start for each node May 8 00:51:23.721643 kernel: Early memory node ranges May 8 00:51:23.721649 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 8 00:51:23.721655 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 8 00:51:23.721660 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 8 00:51:23.721666 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 8 00:51:23.721671 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 8 00:51:23.721677 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 8 00:51:23.721683 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 8 00:51:23.721688 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:51:23.721695 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 8 00:51:23.721701 kernel: psci: probing for conduit method from ACPI. May 8 00:51:23.721706 kernel: psci: PSCIv1.1 detected in firmware. May 8 00:51:23.721712 kernel: psci: Using standard PSCI v0.2 function IDs May 8 00:51:23.721718 kernel: psci: Trusted OS migration not required May 8 00:51:23.721726 kernel: psci: SMC Calling Convention v1.1 May 8 00:51:23.721732 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 8 00:51:23.721739 kernel: ACPI: SRAT not present May 8 00:51:23.721745 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 8 00:51:23.721751 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 8 00:51:23.721757 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 8 00:51:23.721763 kernel: Detected PIPT I-cache on CPU0 May 8 00:51:23.721769 kernel: CPU features: detected: GIC system register CPU interface May 8 00:51:23.721775 kernel: CPU features: detected: Hardware dirty bit management May 8 00:51:23.721781 kernel: CPU features: detected: Spectre-v4 May 8 00:51:23.721787 kernel: CPU features: detected: Spectre-BHB May 8 00:51:23.721794 kernel: CPU features: kernel page table isolation forced ON by KASLR May 8 00:51:23.721800 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 8 00:51:23.721806 kernel: CPU features: detected: ARM erratum 1418040 May 8 00:51:23.721812 kernel: CPU features: detected: SSBS not fully self-synchronizing May 8 00:51:23.721818 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 8 00:51:23.721824 kernel: Policy zone: DMA May 8 00:51:23.721831 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:51:23.721837 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:51:23.721843 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:51:23.721849 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:51:23.721855 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:51:23.721862 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) May 8 00:51:23.721869 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:51:23.721874 kernel: trace event string verifier disabled May 8 00:51:23.721880 kernel: rcu: Preemptible hierarchical RCU implementation. May 8 00:51:23.721887 kernel: rcu: RCU event tracing is enabled. May 8 00:51:23.721893 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:51:23.721899 kernel: Trampoline variant of Tasks RCU enabled. May 8 00:51:23.721905 kernel: Tracing variant of Tasks RCU enabled. May 8 00:51:23.721911 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:51:23.721917 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:51:23.721923 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 8 00:51:23.721930 kernel: GICv3: 256 SPIs implemented May 8 00:51:23.721936 kernel: GICv3: 0 Extended SPIs implemented May 8 00:51:23.721942 kernel: GICv3: Distributor has no Range Selector support May 8 00:51:23.721948 kernel: Root IRQ handler: gic_handle_irq May 8 00:51:23.721954 kernel: GICv3: 16 PPIs implemented May 8 00:51:23.721960 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 8 00:51:23.721966 kernel: ACPI: SRAT not present May 8 00:51:23.721972 kernel: ITS [mem 0x08080000-0x0809ffff] May 8 00:51:23.721978 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 8 00:51:23.721984 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 8 00:51:23.721990 kernel: GICv3: using LPI property table @0x00000000400d0000 May 8 00:51:23.721996 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 8 00:51:23.722003 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:51:23.722009 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 8 00:51:23.722015 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 8 00:51:23.722021 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 8 00:51:23.722027 kernel: arm-pv: using stolen time PV May 8 00:51:23.722034 kernel: Console: colour dummy device 80x25 May 8 00:51:23.722040 kernel: ACPI: Core revision 20210730 May 8 00:51:23.722046 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 8 00:51:23.722052 kernel: pid_max: default: 32768 minimum: 301 May 8 00:51:23.722058 kernel: LSM: Security Framework initializing May 8 00:51:23.722065 kernel: SELinux: Initializing. May 8 00:51:23.722071 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:51:23.722078 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:51:23.722084 kernel: rcu: Hierarchical SRCU implementation. May 8 00:51:23.722090 kernel: Platform MSI: ITS@0x8080000 domain created May 8 00:51:23.722096 kernel: PCI/MSI: ITS@0x8080000 domain created May 8 00:51:23.722102 kernel: Remapping and enabling EFI services. May 8 00:51:23.722108 kernel: smp: Bringing up secondary CPUs ... May 8 00:51:23.722114 kernel: Detected PIPT I-cache on CPU1 May 8 00:51:23.722122 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 8 00:51:23.722128 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 8 00:51:23.722134 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:51:23.722140 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 8 00:51:23.722147 kernel: Detected PIPT I-cache on CPU2 May 8 00:51:23.722153 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 8 00:51:23.722159 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 8 00:51:23.722165 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:51:23.722171 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 8 00:51:23.722177 kernel: Detected PIPT I-cache on CPU3 May 8 00:51:23.722184 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 8 00:51:23.722191 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 8 00:51:23.722197 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:51:23.722203 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 8 00:51:23.722213 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:51:23.722220 kernel: SMP: Total of 4 processors activated. May 8 00:51:23.722227 kernel: CPU features: detected: 32-bit EL0 Support May 8 00:51:23.722233 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 8 00:51:23.722240 kernel: CPU features: detected: Common not Private translations May 8 00:51:23.722246 kernel: CPU features: detected: CRC32 instructions May 8 00:51:23.722253 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 8 00:51:23.722259 kernel: CPU features: detected: LSE atomic instructions May 8 00:51:23.722267 kernel: CPU features: detected: Privileged Access Never May 8 00:51:23.722273 kernel: CPU features: detected: RAS Extension Support May 8 00:51:23.722280 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 8 00:51:23.722286 kernel: CPU: All CPU(s) started at EL1 May 8 00:51:23.722292 kernel: alternatives: patching kernel code May 8 00:51:23.722300 kernel: devtmpfs: initialized May 8 00:51:23.722306 kernel: KASLR enabled May 8 00:51:23.722313 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:51:23.722320 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:51:23.722326 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:51:23.722332 kernel: SMBIOS 3.0.0 present. May 8 00:51:23.722339 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 8 00:51:23.722345 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:51:23.722352 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 8 00:51:23.722364 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 8 00:51:23.722371 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 8 00:51:23.722378 kernel: audit: initializing netlink subsys (disabled) May 8 00:51:23.722385 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 May 8 00:51:23.722403 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:51:23.722410 kernel: cpuidle: using governor menu May 8 00:51:23.722416 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 8 00:51:23.722423 kernel: ASID allocator initialised with 32768 entries May 8 00:51:23.722429 kernel: ACPI: bus type PCI registered May 8 00:51:23.722438 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:51:23.722444 kernel: Serial: AMBA PL011 UART driver May 8 00:51:23.722451 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:51:23.722457 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 8 00:51:23.722464 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:51:23.722471 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 8 00:51:23.722477 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:51:23.722484 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 8 00:51:23.722490 kernel: ACPI: Added _OSI(Module Device) May 8 00:51:23.722498 kernel: ACPI: Added _OSI(Processor Device) May 8 00:51:23.722504 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:51:23.722511 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:51:23.722517 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:51:23.722523 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:51:23.722530 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:51:23.722537 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:51:23.722543 kernel: ACPI: Interpreter enabled May 8 00:51:23.722550 kernel: ACPI: Using GIC for interrupt routing May 8 00:51:23.722558 kernel: ACPI: MCFG table detected, 1 entries May 8 00:51:23.722564 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 8 00:51:23.722571 kernel: printk: console [ttyAMA0] enabled May 8 00:51:23.722577 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:51:23.722693 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:51:23.722756 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 8 00:51:23.722814 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 8 00:51:23.722873 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 8 00:51:23.722953 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 8 00:51:23.722963 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 8 00:51:23.722970 kernel: PCI host bridge to bus 0000:00 May 8 00:51:23.723036 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 8 00:51:23.723115 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 8 00:51:23.723170 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 8 00:51:23.723243 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:51:23.723328 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 8 00:51:23.723426 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:51:23.723492 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 8 00:51:23.723789 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 8 00:51:23.723861 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:51:23.723920 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:51:23.723983 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 8 00:51:23.724043 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 8 00:51:23.724098 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 8 00:51:23.724151 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 8 00:51:23.724204 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 8 00:51:23.724213 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 8 00:51:23.724220 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 8 00:51:23.724226 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 8 00:51:23.724235 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 8 00:51:23.724241 kernel: iommu: Default domain type: Translated May 8 00:51:23.724248 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 8 00:51:23.724254 kernel: vgaarb: loaded May 8 00:51:23.724261 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:51:23.724268 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:51:23.724274 kernel: PTP clock support registered May 8 00:51:23.724281 kernel: Registered efivars operations May 8 00:51:23.724287 kernel: clocksource: Switched to clocksource arch_sys_counter May 8 00:51:23.724295 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:51:23.724302 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:51:23.724351 kernel: pnp: PnP ACPI init May 8 00:51:23.724454 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 8 00:51:23.724466 kernel: pnp: PnP ACPI: found 1 devices May 8 00:51:23.724473 kernel: NET: Registered PF_INET protocol family May 8 00:51:23.724479 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:51:23.724486 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:51:23.724496 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:51:23.724502 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:51:23.724509 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:51:23.724516 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:51:23.724522 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:51:23.724529 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:51:23.724536 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:51:23.724542 kernel: PCI: CLS 0 bytes, default 64 May 8 00:51:23.724549 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 8 00:51:23.724557 kernel: kvm [1]: HYP mode not available May 8 00:51:23.724563 kernel: Initialise system trusted keyrings May 8 00:51:23.724570 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:51:23.724576 kernel: Key type asymmetric registered May 8 00:51:23.724582 kernel: Asymmetric key parser 'x509' registered May 8 00:51:23.724589 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:51:23.724595 kernel: io scheduler mq-deadline registered May 8 00:51:23.724602 kernel: io scheduler kyber registered May 8 00:51:23.724609 kernel: io scheduler bfq registered May 8 00:51:23.724617 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 8 00:51:23.724623 kernel: ACPI: button: Power Button [PWRB] May 8 00:51:23.724630 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 8 00:51:23.724692 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 8 00:51:23.724701 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:51:23.724708 kernel: thunder_xcv, ver 1.0 May 8 00:51:23.724714 kernel: thunder_bgx, ver 1.0 May 8 00:51:23.724721 kernel: nicpf, ver 1.0 May 8 00:51:23.724727 kernel: nicvf, ver 1.0 May 8 00:51:23.724794 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 8 00:51:23.724850 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-08T00:51:23 UTC (1746665483) May 8 00:51:23.724859 kernel: hid: raw HID events driver (C) Jiri Kosina May 8 00:51:23.724865 kernel: NET: Registered PF_INET6 protocol family May 8 00:51:23.724872 kernel: Segment Routing with IPv6 May 8 00:51:23.724878 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:51:23.724885 kernel: NET: Registered PF_PACKET protocol family May 8 00:51:23.724892 kernel: Key type dns_resolver registered May 8 00:51:23.724900 kernel: registered taskstats version 1 May 8 00:51:23.724906 kernel: Loading compiled-in X.509 certificates May 8 00:51:23.724913 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: 47302b466ab2df930dd804d2ee9c8ab44de4e2dc' May 8 00:51:23.724920 kernel: Key type .fscrypt registered May 8 00:51:23.724926 kernel: Key type fscrypt-provisioning registered May 8 00:51:23.724933 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:51:23.724939 kernel: ima: Allocated hash algorithm: sha1 May 8 00:51:23.724946 kernel: ima: No architecture policies found May 8 00:51:23.724952 kernel: clk: Disabling unused clocks May 8 00:51:23.724960 kernel: Freeing unused kernel memory: 36416K May 8 00:51:23.724967 kernel: Run /init as init process May 8 00:51:23.724973 kernel: with arguments: May 8 00:51:23.724979 kernel: /init May 8 00:51:23.724986 kernel: with environment: May 8 00:51:23.724992 kernel: HOME=/ May 8 00:51:23.724998 kernel: TERM=linux May 8 00:51:23.725005 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:51:23.725013 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:51:23.725023 systemd[1]: Detected virtualization kvm. May 8 00:51:23.725030 systemd[1]: Detected architecture arm64. May 8 00:51:23.725036 systemd[1]: Running in initrd. May 8 00:51:23.725043 systemd[1]: No hostname configured, using default hostname. May 8 00:51:23.725050 systemd[1]: Hostname set to . May 8 00:51:23.725058 systemd[1]: Initializing machine ID from VM UUID. May 8 00:51:23.725065 systemd[1]: Queued start job for default target initrd.target. May 8 00:51:23.725073 systemd[1]: Started systemd-ask-password-console.path. May 8 00:51:23.725079 systemd[1]: Reached target cryptsetup.target. May 8 00:51:23.725086 systemd[1]: Reached target paths.target. May 8 00:51:23.725093 systemd[1]: Reached target slices.target. May 8 00:51:23.725100 systemd[1]: Reached target swap.target. May 8 00:51:23.725106 systemd[1]: Reached target timers.target. May 8 00:51:23.725114 systemd[1]: Listening on iscsid.socket. May 8 00:51:23.725121 systemd[1]: Listening on iscsiuio.socket. May 8 00:51:23.725128 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:51:23.725135 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:51:23.725142 systemd[1]: Listening on systemd-journald.socket. May 8 00:51:23.725149 systemd[1]: Listening on systemd-networkd.socket. May 8 00:51:23.725156 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:51:23.725163 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:51:23.725170 systemd[1]: Reached target sockets.target. May 8 00:51:23.725177 systemd[1]: Starting kmod-static-nodes.service... May 8 00:51:23.725185 systemd[1]: Finished network-cleanup.service. May 8 00:51:23.725191 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:51:23.725198 systemd[1]: Starting systemd-journald.service... May 8 00:51:23.725205 systemd[1]: Starting systemd-modules-load.service... May 8 00:51:23.725212 systemd[1]: Starting systemd-resolved.service... May 8 00:51:23.725219 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:51:23.725226 systemd[1]: Finished kmod-static-nodes.service. May 8 00:51:23.725233 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:51:23.725240 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:51:23.725248 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:51:23.725255 kernel: audit: type=1130 audit(1746665483.720:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.725262 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:51:23.725272 systemd-journald[290]: Journal started May 8 00:51:23.725311 systemd-journald[290]: Runtime Journal (/run/log/journal/c306ebee01424302b51594f1f51f3ddc) is 6.0M, max 48.7M, 42.6M free. May 8 00:51:23.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.717500 systemd-modules-load[291]: Inserted module 'overlay' May 8 00:51:23.730165 systemd[1]: Started systemd-journald.service. May 8 00:51:23.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.734314 kernel: audit: type=1130 audit(1746665483.730:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.733481 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:51:23.737564 kernel: audit: type=1130 audit(1746665483.733:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.741068 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:51:23.744876 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:51:23.749917 kernel: Bridge firewalling registered May 8 00:51:23.749933 kernel: audit: type=1130 audit(1746665483.745:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.746382 systemd[1]: Starting dracut-cmdline.service... May 8 00:51:23.746823 systemd-modules-load[291]: Inserted module 'br_netfilter' May 8 00:51:23.749452 systemd-resolved[292]: Positive Trust Anchors: May 8 00:51:23.749460 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:51:23.749487 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:51:23.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.753573 systemd-resolved[292]: Defaulting to hostname 'linux'. May 8 00:51:23.765100 kernel: audit: type=1130 audit(1746665483.755:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.765119 kernel: SCSI subsystem initialized May 8 00:51:23.765135 dracut-cmdline[308]: dracut-dracut-053 May 8 00:51:23.755035 systemd[1]: Started systemd-resolved.service. May 8 00:51:23.756087 systemd[1]: Reached target nss-lookup.target. May 8 00:51:23.767337 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:51:23.773741 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:51:23.773760 kernel: device-mapper: uevent: version 1.0.3 May 8 00:51:23.774739 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:51:23.776939 systemd-modules-load[291]: Inserted module 'dm_multipath' May 8 00:51:23.777677 systemd[1]: Finished systemd-modules-load.service. May 8 00:51:23.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.779142 systemd[1]: Starting systemd-sysctl.service... May 8 00:51:23.782760 kernel: audit: type=1130 audit(1746665483.778:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.787351 systemd[1]: Finished systemd-sysctl.service. May 8 00:51:23.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.791401 kernel: audit: type=1130 audit(1746665483.787:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.826410 kernel: Loading iSCSI transport class v2.0-870. May 8 00:51:23.838422 kernel: iscsi: registered transport (tcp) May 8 00:51:23.855451 kernel: iscsi: registered transport (qla4xxx) May 8 00:51:23.855476 kernel: QLogic iSCSI HBA Driver May 8 00:51:23.889557 systemd[1]: Finished dracut-cmdline.service. May 8 00:51:23.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.891145 systemd[1]: Starting dracut-pre-udev.service... May 8 00:51:23.894595 kernel: audit: type=1130 audit(1746665483.889:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:23.935426 kernel: raid6: neonx8 gen() 13826 MB/s May 8 00:51:23.952403 kernel: raid6: neonx8 xor() 10820 MB/s May 8 00:51:23.969408 kernel: raid6: neonx4 gen() 13561 MB/s May 8 00:51:23.986408 kernel: raid6: neonx4 xor() 11183 MB/s May 8 00:51:24.003410 kernel: raid6: neonx2 gen() 12962 MB/s May 8 00:51:24.020412 kernel: raid6: neonx2 xor() 10223 MB/s May 8 00:51:24.037412 kernel: raid6: neonx1 gen() 10519 MB/s May 8 00:51:24.054406 kernel: raid6: neonx1 xor() 8767 MB/s May 8 00:51:24.071404 kernel: raid6: int64x8 gen() 6269 MB/s May 8 00:51:24.088402 kernel: raid6: int64x8 xor() 3544 MB/s May 8 00:51:24.105407 kernel: raid6: int64x4 gen() 7195 MB/s May 8 00:51:24.122409 kernel: raid6: int64x4 xor() 3857 MB/s May 8 00:51:24.139405 kernel: raid6: int64x2 gen() 6155 MB/s May 8 00:51:24.156414 kernel: raid6: int64x2 xor() 3315 MB/s May 8 00:51:24.173419 kernel: raid6: int64x1 gen() 5041 MB/s May 8 00:51:24.190420 kernel: raid6: int64x1 xor() 2645 MB/s May 8 00:51:24.190432 kernel: raid6: using algorithm neonx8 gen() 13826 MB/s May 8 00:51:24.190441 kernel: raid6: .... xor() 10820 MB/s, rmw enabled May 8 00:51:24.191445 kernel: raid6: using neon recovery algorithm May 8 00:51:24.201411 kernel: xor: measuring software checksum speed May 8 00:51:24.201426 kernel: 8regs : 14781 MB/sec May 8 00:51:24.202494 kernel: 32regs : 20702 MB/sec May 8 00:51:24.203674 kernel: arm64_neon : 27524 MB/sec May 8 00:51:24.203688 kernel: xor: using function: arm64_neon (27524 MB/sec) May 8 00:51:24.257414 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 8 00:51:24.268014 systemd[1]: Finished dracut-pre-udev.service. May 8 00:51:24.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:24.271000 audit: BPF prog-id=7 op=LOAD May 8 00:51:24.271000 audit: BPF prog-id=8 op=LOAD May 8 00:51:24.271942 systemd[1]: Starting systemd-udevd.service... May 8 00:51:24.273231 kernel: audit: type=1130 audit(1746665484.268:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:24.283656 systemd-udevd[491]: Using default interface naming scheme 'v252'. May 8 00:51:24.287065 systemd[1]: Started systemd-udevd.service. May 8 00:51:24.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:24.288611 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:51:24.300277 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 8 00:51:24.327221 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:51:24.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:24.328727 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:51:24.361134 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:51:24.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:24.407417 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:51:24.412496 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:51:24.412510 kernel: GPT:9289727 != 19775487 May 8 00:51:24.412519 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:51:24.412528 kernel: GPT:9289727 != 19775487 May 8 00:51:24.412536 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:51:24.412544 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:51:24.427523 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:51:24.431407 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (550) May 8 00:51:24.432716 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:51:24.435697 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:51:24.436666 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:51:24.440794 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:51:24.442420 systemd[1]: Starting disk-uuid.service... May 8 00:51:24.448059 disk-uuid[563]: Primary Header is updated. May 8 00:51:24.448059 disk-uuid[563]: Secondary Entries is updated. May 8 00:51:24.448059 disk-uuid[563]: Secondary Header is updated. May 8 00:51:24.451398 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:51:25.464415 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:51:25.464996 disk-uuid[564]: The operation has completed successfully. May 8 00:51:25.494259 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:51:25.494364 systemd[1]: Finished disk-uuid.service. May 8 00:51:25.496022 systemd[1]: Starting verity-setup.service... May 8 00:51:25.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.519410 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 8 00:51:25.542454 systemd[1]: Found device dev-mapper-usr.device. May 8 00:51:25.544995 systemd[1]: Mounting sysusr-usr.mount... May 8 00:51:25.546639 systemd[1]: Finished verity-setup.service. May 8 00:51:25.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.595352 systemd[1]: Mounted sysusr-usr.mount. May 8 00:51:25.596617 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:51:25.596144 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:51:25.596793 systemd[1]: Starting ignition-setup.service... May 8 00:51:25.599134 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:51:25.604954 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:51:25.604987 kernel: BTRFS info (device vda6): using free space tree May 8 00:51:25.604997 kernel: BTRFS info (device vda6): has skinny extents May 8 00:51:25.613631 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:51:25.619843 systemd[1]: Finished ignition-setup.service. May 8 00:51:25.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.621289 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:51:25.676976 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:51:25.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.678000 audit: BPF prog-id=9 op=LOAD May 8 00:51:25.679066 systemd[1]: Starting systemd-networkd.service... May 8 00:51:25.693462 ignition[648]: Ignition 2.14.0 May 8 00:51:25.693472 ignition[648]: Stage: fetch-offline May 8 00:51:25.693511 ignition[648]: no configs at "/usr/lib/ignition/base.d" May 8 00:51:25.693520 ignition[648]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:25.693679 ignition[648]: parsed url from cmdline: "" May 8 00:51:25.693682 ignition[648]: no config URL provided May 8 00:51:25.693687 ignition[648]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:51:25.693695 ignition[648]: no config at "/usr/lib/ignition/user.ign" May 8 00:51:25.693713 ignition[648]: op(1): [started] loading QEMU firmware config module May 8 00:51:25.693717 ignition[648]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:51:25.702443 ignition[648]: op(1): [finished] loading QEMU firmware config module May 8 00:51:25.708772 systemd-networkd[739]: lo: Link UP May 8 00:51:25.709642 systemd-networkd[739]: lo: Gained carrier May 8 00:51:25.710821 systemd-networkd[739]: Enumeration completed May 8 00:51:25.711772 systemd[1]: Started systemd-networkd.service. May 8 00:51:25.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.712799 systemd[1]: Reached target network.target. May 8 00:51:25.714572 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:51:25.714841 systemd[1]: Starting iscsiuio.service... May 8 00:51:25.715627 systemd-networkd[739]: eth0: Link UP May 8 00:51:25.715631 systemd-networkd[739]: eth0: Gained carrier May 8 00:51:25.724929 systemd[1]: Started iscsiuio.service. May 8 00:51:25.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.726542 systemd[1]: Starting iscsid.service... May 8 00:51:25.729778 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:51:25.729778 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:51:25.729778 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:51:25.729778 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:51:25.729778 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:51:25.729778 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:51:25.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.732672 systemd[1]: Started iscsid.service. May 8 00:51:25.738167 systemd[1]: Starting dracut-initqueue.service... May 8 00:51:25.739473 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.127/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:51:25.747880 systemd[1]: Finished dracut-initqueue.service. May 8 00:51:25.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.748856 systemd[1]: Reached target remote-fs-pre.target. May 8 00:51:25.750410 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:51:25.752031 systemd[1]: Reached target remote-fs.target. May 8 00:51:25.754202 systemd[1]: Starting dracut-pre-mount.service... May 8 00:51:25.761321 systemd[1]: Finished dracut-pre-mount.service. May 8 00:51:25.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.770269 ignition[648]: parsing config with SHA512: 875915915f9e988ce39892eba1661e62f83dd94d90bb2fc9f4cbebb5c355c740fdfe1f9231ae0a171db20c5fdb10c2fbb78ba7b9bbe5f462694e36ef1f4219af May 8 00:51:25.776496 unknown[648]: fetched base config from "system" May 8 00:51:25.776507 unknown[648]: fetched user config from "qemu" May 8 00:51:25.776894 ignition[648]: fetch-offline: fetch-offline passed May 8 00:51:25.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.777734 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:51:25.776944 ignition[648]: Ignition finished successfully May 8 00:51:25.778921 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:51:25.779613 systemd[1]: Starting ignition-kargs.service... May 8 00:51:25.787511 ignition[760]: Ignition 2.14.0 May 8 00:51:25.787521 ignition[760]: Stage: kargs May 8 00:51:25.787606 ignition[760]: no configs at "/usr/lib/ignition/base.d" May 8 00:51:25.789655 systemd[1]: Finished ignition-kargs.service. May 8 00:51:25.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.787615 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:25.788449 ignition[760]: kargs: kargs passed May 8 00:51:25.791704 systemd[1]: Starting ignition-disks.service... May 8 00:51:25.788489 ignition[760]: Ignition finished successfully May 8 00:51:25.797980 ignition[766]: Ignition 2.14.0 May 8 00:51:25.797990 ignition[766]: Stage: disks May 8 00:51:25.798081 ignition[766]: no configs at "/usr/lib/ignition/base.d" May 8 00:51:25.798091 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:25.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.799551 systemd[1]: Finished ignition-disks.service. May 8 00:51:25.798876 ignition[766]: disks: disks passed May 8 00:51:25.800806 systemd[1]: Reached target initrd-root-device.target. May 8 00:51:25.798917 ignition[766]: Ignition finished successfully May 8 00:51:25.802241 systemd[1]: Reached target local-fs-pre.target. May 8 00:51:25.803534 systemd[1]: Reached target local-fs.target. May 8 00:51:25.804672 systemd[1]: Reached target sysinit.target. May 8 00:51:25.805973 systemd[1]: Reached target basic.target. May 8 00:51:25.807964 systemd[1]: Starting systemd-fsck-root.service... May 8 00:51:25.818141 systemd-fsck[774]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 8 00:51:25.821687 systemd[1]: Finished systemd-fsck-root.service. May 8 00:51:25.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.823497 systemd[1]: Mounting sysroot.mount... May 8 00:51:25.828411 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:51:25.828763 systemd[1]: Mounted sysroot.mount. May 8 00:51:25.829484 systemd[1]: Reached target initrd-root-fs.target. May 8 00:51:25.832113 systemd[1]: Mounting sysroot-usr.mount... May 8 00:51:25.833010 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:51:25.833046 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:51:25.833069 systemd[1]: Reached target ignition-diskful.target. May 8 00:51:25.834798 systemd[1]: Mounted sysroot-usr.mount. May 8 00:51:25.836745 systemd[1]: Starting initrd-setup-root.service... May 8 00:51:25.840955 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:51:25.845623 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory May 8 00:51:25.849349 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:51:25.853434 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:51:25.878248 systemd[1]: Finished initrd-setup-root.service. May 8 00:51:25.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.879759 systemd[1]: Starting ignition-mount.service... May 8 00:51:25.881049 systemd[1]: Starting sysroot-boot.service... May 8 00:51:25.885342 bash[825]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:51:25.893877 ignition[827]: INFO : Ignition 2.14.0 May 8 00:51:25.893877 ignition[827]: INFO : Stage: mount May 8 00:51:25.896060 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:51:25.896060 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:25.896060 ignition[827]: INFO : mount: mount passed May 8 00:51:25.896060 ignition[827]: INFO : Ignition finished successfully May 8 00:51:25.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.897267 systemd[1]: Finished ignition-mount.service. May 8 00:51:25.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:25.899653 systemd[1]: Finished sysroot-boot.service. May 8 00:51:26.554193 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:51:26.561126 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (836) May 8 00:51:26.561158 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:51:26.561168 kernel: BTRFS info (device vda6): using free space tree May 8 00:51:26.561768 kernel: BTRFS info (device vda6): has skinny extents May 8 00:51:26.565045 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:51:26.566541 systemd[1]: Starting ignition-files.service... May 8 00:51:26.579877 ignition[856]: INFO : Ignition 2.14.0 May 8 00:51:26.579877 ignition[856]: INFO : Stage: files May 8 00:51:26.581510 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:51:26.581510 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:26.581510 ignition[856]: DEBUG : files: compiled without relabeling support, skipping May 8 00:51:26.585414 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:51:26.585414 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:51:26.588127 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:51:26.588127 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:51:26.590901 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:51:26.590901 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 8 00:51:26.590901 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 8 00:51:26.588462 unknown[856]: wrote ssh authorized keys file for user: core May 8 00:51:26.709541 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:51:26.923323 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 8 00:51:26.923323 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:51:26.926965 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 8 00:51:27.234142 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:51:27.439641 systemd-networkd[739]: eth0: Gained IPv6LL May 8 00:51:27.647565 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 8 00:51:27.647565 ignition[856]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:51:27.651042 ignition[856]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:51:27.695880 ignition[856]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:51:27.698123 ignition[856]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:51:27.698123 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:51:27.698123 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:51:27.698123 ignition[856]: INFO : files: files passed May 8 00:51:27.698123 ignition[856]: INFO : Ignition finished successfully May 8 00:51:27.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.698153 systemd[1]: Finished ignition-files.service. May 8 00:51:27.701179 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:51:27.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.708862 initrd-setup-root-after-ignition[881]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:51:27.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.702607 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:51:27.713070 initrd-setup-root-after-ignition[883]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:51:27.703224 systemd[1]: Starting ignition-quench.service... May 8 00:51:27.706714 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:51:27.706790 systemd[1]: Finished ignition-quench.service. May 8 00:51:27.708337 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:51:27.709698 systemd[1]: Reached target ignition-complete.target. May 8 00:51:27.712069 systemd[1]: Starting initrd-parse-etc.service... May 8 00:51:27.723868 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:51:27.723953 systemd[1]: Finished initrd-parse-etc.service. May 8 00:51:27.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.725531 systemd[1]: Reached target initrd-fs.target. May 8 00:51:27.726711 systemd[1]: Reached target initrd.target. May 8 00:51:27.727971 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:51:27.728662 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:51:27.738334 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:51:27.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.739837 systemd[1]: Starting initrd-cleanup.service... May 8 00:51:27.747115 systemd[1]: Stopped target nss-lookup.target. May 8 00:51:27.747981 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:51:27.749455 systemd[1]: Stopped target timers.target. May 8 00:51:27.750728 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:51:27.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.750827 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:51:27.752069 systemd[1]: Stopped target initrd.target. May 8 00:51:27.753427 systemd[1]: Stopped target basic.target. May 8 00:51:27.754686 systemd[1]: Stopped target ignition-complete.target. May 8 00:51:27.756010 systemd[1]: Stopped target ignition-diskful.target. May 8 00:51:27.757279 systemd[1]: Stopped target initrd-root-device.target. May 8 00:51:27.758702 systemd[1]: Stopped target remote-fs.target. May 8 00:51:27.760021 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:51:27.761349 systemd[1]: Stopped target sysinit.target. May 8 00:51:27.762582 systemd[1]: Stopped target local-fs.target. May 8 00:51:27.763829 systemd[1]: Stopped target local-fs-pre.target. May 8 00:51:27.765091 systemd[1]: Stopped target swap.target. May 8 00:51:27.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.766254 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:51:27.766356 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:51:27.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.767645 systemd[1]: Stopped target cryptsetup.target. May 8 00:51:27.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.768833 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:51:27.768931 systemd[1]: Stopped dracut-initqueue.service. May 8 00:51:27.770317 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:51:27.770436 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:51:27.771661 systemd[1]: Stopped target paths.target. May 8 00:51:27.772768 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:51:27.776433 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:51:27.777421 systemd[1]: Stopped target slices.target. May 8 00:51:27.778915 systemd[1]: Stopped target sockets.target. May 8 00:51:27.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.780238 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:51:27.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.780343 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:51:27.786462 iscsid[745]: iscsid shutting down. May 8 00:51:27.781654 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:51:27.781746 systemd[1]: Stopped ignition-files.service. May 8 00:51:27.783578 systemd[1]: Stopping ignition-mount.service... May 8 00:51:27.784481 systemd[1]: Stopping iscsid.service... May 8 00:51:27.790496 ignition[896]: INFO : Ignition 2.14.0 May 8 00:51:27.790496 ignition[896]: INFO : Stage: umount May 8 00:51:27.790496 ignition[896]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:51:27.790496 ignition[896]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:51:27.794443 ignition[896]: INFO : umount: umount passed May 8 00:51:27.794443 ignition[896]: INFO : Ignition finished successfully May 8 00:51:27.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.792113 systemd[1]: Stopping sysroot-boot.service... May 8 00:51:27.793424 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:51:27.793556 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:51:27.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.795344 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:51:27.795503 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:51:27.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.799083 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:51:27.799174 systemd[1]: Stopped iscsid.service. May 8 00:51:27.801156 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:51:27.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.801741 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:51:27.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.801918 systemd[1]: Stopped ignition-mount.service. May 8 00:51:27.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.805099 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:51:27.805133 systemd[1]: Closed iscsid.socket. May 8 00:51:27.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.806230 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:51:27.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.806271 systemd[1]: Stopped ignition-disks.service. May 8 00:51:27.807466 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:51:27.807505 systemd[1]: Stopped ignition-kargs.service. May 8 00:51:27.808863 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:51:27.808899 systemd[1]: Stopped ignition-setup.service. May 8 00:51:27.810310 systemd[1]: Stopping iscsiuio.service... May 8 00:51:27.812909 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:51:27.813014 systemd[1]: Finished initrd-cleanup.service. May 8 00:51:27.814364 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:51:27.814481 systemd[1]: Stopped iscsiuio.service. May 8 00:51:27.816215 systemd[1]: Stopped target network.target. May 8 00:51:27.818974 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:51:27.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.819008 systemd[1]: Closed iscsiuio.socket. May 8 00:51:27.820301 systemd[1]: Stopping systemd-networkd.service... May 8 00:51:27.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.821825 systemd[1]: Stopping systemd-resolved.service... May 8 00:51:27.831025 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:51:27.831123 systemd[1]: Stopped systemd-resolved.service. May 8 00:51:27.838000 audit: BPF prog-id=6 op=UNLOAD May 8 00:51:27.832459 systemd-networkd[739]: eth0: DHCPv6 lease lost May 8 00:51:27.838000 audit: BPF prog-id=9 op=UNLOAD May 8 00:51:27.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.833664 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:51:27.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.833751 systemd[1]: Stopped systemd-networkd.service. May 8 00:51:27.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.835215 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:51:27.835243 systemd[1]: Closed systemd-networkd.socket. May 8 00:51:27.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.837112 systemd[1]: Stopping network-cleanup.service... May 8 00:51:27.838590 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:51:27.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.838644 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:51:27.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.840051 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:51:27.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.840141 systemd[1]: Stopped systemd-sysctl.service. May 8 00:51:27.842340 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:51:27.842477 systemd[1]: Stopped systemd-modules-load.service. May 8 00:51:27.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.843362 systemd[1]: Stopping systemd-udevd.service... May 8 00:51:27.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.846028 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:51:27.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.849121 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:51:27.849217 systemd[1]: Stopped sysroot-boot.service. May 8 00:51:27.850171 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:51:27.850250 systemd[1]: Stopped network-cleanup.service. May 8 00:51:27.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.851727 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:51:27.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.851766 systemd[1]: Stopped initrd-setup-root.service. May 8 00:51:27.853361 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:51:27.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:27.853518 systemd[1]: Stopped systemd-udevd.service. May 8 00:51:27.854700 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:51:27.854734 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:51:27.856011 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:51:27.856041 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:51:27.857257 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:51:27.857300 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:51:27.858778 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:51:27.858820 systemd[1]: Stopped dracut-cmdline.service. May 8 00:51:27.860091 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:51:27.860129 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:51:27.862042 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:51:27.863099 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 8 00:51:27.863154 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 8 00:51:27.865335 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:51:27.865373 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:51:27.866934 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:51:27.866971 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:51:27.869051 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 8 00:51:27.869447 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:51:27.869525 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:51:27.870770 systemd[1]: Reached target initrd-switch-root.target. May 8 00:51:27.872821 systemd[1]: Starting initrd-switch-root.service... May 8 00:51:27.878921 systemd[1]: Switching root. May 8 00:51:27.895748 systemd-journald[290]: Journal stopped May 8 00:51:29.947891 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 8 00:51:29.947957 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:51:29.948011 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:51:29.948025 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:51:29.948035 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:51:29.948045 kernel: SELinux: policy capability open_perms=1 May 8 00:51:29.948057 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:51:29.948066 kernel: SELinux: policy capability always_check_network=0 May 8 00:51:29.948082 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:51:29.948092 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:51:29.948102 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:51:29.948112 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:51:29.948123 systemd[1]: Successfully loaded SELinux policy in 34.432ms. May 8 00:51:29.948135 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.430ms. May 8 00:51:29.948148 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:51:29.948158 systemd[1]: Detected virtualization kvm. May 8 00:51:29.948169 systemd[1]: Detected architecture arm64. May 8 00:51:29.948178 systemd[1]: Detected first boot. May 8 00:51:29.948189 systemd[1]: Initializing machine ID from VM UUID. May 8 00:51:29.948200 kernel: kauditd_printk_skb: 66 callbacks suppressed May 8 00:51:29.948210 kernel: audit: type=1400 audit(1746665488.057:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:51:29.948221 kernel: audit: type=1400 audit(1746665488.057:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:51:29.948230 kernel: audit: type=1334 audit(1746665488.058:79): prog-id=10 op=LOAD May 8 00:51:29.948243 kernel: audit: type=1334 audit(1746665488.058:80): prog-id=10 op=UNLOAD May 8 00:51:29.948252 kernel: audit: type=1334 audit(1746665488.060:81): prog-id=11 op=LOAD May 8 00:51:29.948262 kernel: audit: type=1334 audit(1746665488.060:82): prog-id=11 op=UNLOAD May 8 00:51:29.948311 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:51:29.948332 kernel: audit: type=1400 audit(1746665488.114:83): avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:51:29.948343 kernel: audit: type=1300 audit(1746665488.114:83): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd8b4 a1=40000d0de0 a2=40000d70c0 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:29.948354 kernel: audit: type=1327 audit(1746665488.114:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:51:29.948365 kernel: audit: type=1400 audit(1746665488.116:84): avc: denied { associate } for pid=930 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:51:29.948377 systemd[1]: Populated /etc with preset unit settings. May 8 00:51:29.948441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:51:29.948462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:51:29.948475 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:51:29.948485 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:51:29.948500 systemd[1]: Stopped initrd-switch-root.service. May 8 00:51:29.948511 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:51:29.948521 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:51:29.948536 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:51:29.948546 systemd[1]: Created slice system-getty.slice. May 8 00:51:29.948556 systemd[1]: Created slice system-modprobe.slice. May 8 00:51:29.948567 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:51:29.948577 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:51:29.948588 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:51:29.948598 systemd[1]: Created slice user.slice. May 8 00:51:29.948608 systemd[1]: Started systemd-ask-password-console.path. May 8 00:51:29.948620 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:51:29.948633 systemd[1]: Set up automount boot.automount. May 8 00:51:29.948643 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:51:29.948654 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:51:29.948665 systemd[1]: Stopped target initrd-fs.target. May 8 00:51:29.948674 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:51:29.948689 systemd[1]: Reached target integritysetup.target. May 8 00:51:29.948701 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:51:29.948711 systemd[1]: Reached target remote-fs.target. May 8 00:51:29.948723 systemd[1]: Reached target slices.target. May 8 00:51:29.948734 systemd[1]: Reached target swap.target. May 8 00:51:29.948744 systemd[1]: Reached target torcx.target. May 8 00:51:29.948755 systemd[1]: Reached target veritysetup.target. May 8 00:51:29.948765 systemd[1]: Listening on systemd-coredump.socket. May 8 00:51:29.948775 systemd[1]: Listening on systemd-initctl.socket. May 8 00:51:29.948786 systemd[1]: Listening on systemd-networkd.socket. May 8 00:51:29.948796 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:51:29.948806 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:51:29.948817 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:51:29.948829 systemd[1]: Mounting dev-hugepages.mount... May 8 00:51:29.948839 systemd[1]: Mounting dev-mqueue.mount... May 8 00:51:29.948849 systemd[1]: Mounting media.mount... May 8 00:51:29.948860 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:51:29.948871 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:51:29.948881 systemd[1]: Mounting tmp.mount... May 8 00:51:29.948891 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:51:29.948901 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:51:29.948912 systemd[1]: Starting kmod-static-nodes.service... May 8 00:51:29.948923 systemd[1]: Starting modprobe@configfs.service... May 8 00:51:29.948934 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:51:29.948944 systemd[1]: Starting modprobe@drm.service... May 8 00:51:29.948954 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:51:29.948964 systemd[1]: Starting modprobe@fuse.service... May 8 00:51:29.948975 systemd[1]: Starting modprobe@loop.service... May 8 00:51:29.948985 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:51:29.948995 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:51:29.949005 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:51:29.949016 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:51:29.949027 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:51:29.949037 systemd[1]: Stopped systemd-journald.service. May 8 00:51:29.949047 kernel: fuse: init (API version 7.34) May 8 00:51:29.949057 systemd[1]: Starting systemd-journald.service... May 8 00:51:29.949066 kernel: loop: module loaded May 8 00:51:29.949077 systemd[1]: Starting systemd-modules-load.service... May 8 00:51:29.949088 systemd[1]: Starting systemd-network-generator.service... May 8 00:51:29.949098 systemd[1]: Starting systemd-remount-fs.service... May 8 00:51:29.949109 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:51:29.949119 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:51:29.949129 systemd[1]: Stopped verity-setup.service. May 8 00:51:29.949139 systemd[1]: Mounted dev-hugepages.mount. May 8 00:51:29.949149 systemd[1]: Mounted dev-mqueue.mount. May 8 00:51:29.949160 systemd[1]: Mounted media.mount. May 8 00:51:29.949169 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:51:29.949179 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:51:29.949191 systemd-journald[992]: Journal started May 8 00:51:29.949236 systemd-journald[992]: Runtime Journal (/run/log/journal/c306ebee01424302b51594f1f51f3ddc) is 6.0M, max 48.7M, 42.6M free. May 8 00:51:27.959000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:51:28.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:51:28.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:51:28.058000 audit: BPF prog-id=10 op=LOAD May 8 00:51:28.058000 audit: BPF prog-id=10 op=UNLOAD May 8 00:51:28.060000 audit: BPF prog-id=11 op=LOAD May 8 00:51:28.060000 audit: BPF prog-id=11 op=UNLOAD May 8 00:51:28.114000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:51:28.114000 audit[930]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd8b4 a1=40000d0de0 a2=40000d70c0 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:28.114000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:51:28.116000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:51:28.116000 audit[930]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001cd989 a2=1ed a3=0 items=2 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:28.116000 audit: CWD cwd="/" May 8 00:51:28.116000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:51:28.116000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:51:28.116000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:51:29.818000 audit: BPF prog-id=12 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=3 op=UNLOAD May 8 00:51:29.818000 audit: BPF prog-id=13 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=14 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=4 op=UNLOAD May 8 00:51:29.818000 audit: BPF prog-id=5 op=UNLOAD May 8 00:51:29.818000 audit: BPF prog-id=15 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=12 op=UNLOAD May 8 00:51:29.818000 audit: BPF prog-id=16 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=17 op=LOAD May 8 00:51:29.818000 audit: BPF prog-id=13 op=UNLOAD May 8 00:51:29.818000 audit: BPF prog-id=14 op=UNLOAD May 8 00:51:29.819000 audit: BPF prog-id=18 op=LOAD May 8 00:51:29.819000 audit: BPF prog-id=15 op=UNLOAD May 8 00:51:29.819000 audit: BPF prog-id=19 op=LOAD May 8 00:51:29.819000 audit: BPF prog-id=20 op=LOAD May 8 00:51:29.819000 audit: BPF prog-id=16 op=UNLOAD May 8 00:51:29.819000 audit: BPF prog-id=17 op=UNLOAD May 8 00:51:29.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.827000 audit: BPF prog-id=18 op=UNLOAD May 8 00:51:29.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.922000 audit: BPF prog-id=21 op=LOAD May 8 00:51:29.923000 audit: BPF prog-id=22 op=LOAD May 8 00:51:29.924000 audit: BPF prog-id=23 op=LOAD May 8 00:51:29.924000 audit: BPF prog-id=19 op=UNLOAD May 8 00:51:29.924000 audit: BPF prog-id=20 op=UNLOAD May 8 00:51:29.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.946000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:51:29.946000 audit[992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffea1eca20 a2=4000 a3=1 items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:29.946000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:51:29.816598 systemd[1]: Queued start job for default target multi-user.target. May 8 00:51:29.950465 systemd[1]: Started systemd-journald.service. May 8 00:51:28.113522 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:51:29.816611 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:51:28.113811 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:51:29.820028 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:51:28.113830 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:51:28.113860 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:51:28.113869 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:51:28.113896 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:51:28.113908 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:51:28.114103 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:51:28.114136 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:51:28.114148 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:51:28.114728 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:51:28.114761 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:51:28.114780 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:51:28.114794 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:51:28.114818 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:51:28.114833 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:51:29.574589 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:51:29.574858 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:51:29.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.574963 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:51:29.575126 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:51:29.575173 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:51:29.575229 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-08T00:51:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:51:29.952286 systemd[1]: Mounted tmp.mount. May 8 00:51:29.953520 systemd[1]: Finished kmod-static-nodes.service. May 8 00:51:29.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.954598 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:51:29.954761 systemd[1]: Finished modprobe@configfs.service. May 8 00:51:29.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.955799 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:51:29.955957 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:51:29.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.956976 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:51:29.957128 systemd[1]: Finished modprobe@drm.service. May 8 00:51:29.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.958164 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:51:29.958278 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:51:29.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.959334 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:51:29.959735 systemd[1]: Finished modprobe@fuse.service. May 8 00:51:29.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.960735 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:51:29.960878 systemd[1]: Finished modprobe@loop.service. May 8 00:51:29.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.961933 systemd[1]: Finished systemd-modules-load.service. May 8 00:51:29.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.963457 systemd[1]: Finished systemd-network-generator.service. May 8 00:51:29.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.964632 systemd[1]: Finished systemd-remount-fs.service. May 8 00:51:29.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.965919 systemd[1]: Reached target network-pre.target. May 8 00:51:29.967965 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:51:29.969945 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:51:29.970771 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:51:29.972250 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:51:29.974165 systemd[1]: Starting systemd-journal-flush.service... May 8 00:51:29.975109 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:51:29.976135 systemd[1]: Starting systemd-random-seed.service... May 8 00:51:29.977073 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:51:29.978088 systemd[1]: Starting systemd-sysctl.service... May 8 00:51:29.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.980411 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:51:29.982598 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:51:29.983924 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:51:29.985002 systemd[1]: Finished systemd-random-seed.service. May 8 00:51:29.987328 systemd-journald[992]: Time spent on flushing to /var/log/journal/c306ebee01424302b51594f1f51f3ddc is 14.322ms for 1005 entries. May 8 00:51:29.987328 systemd-journald[992]: System Journal (/var/log/journal/c306ebee01424302b51594f1f51f3ddc) is 8.0M, max 195.6M, 187.6M free. May 8 00:51:30.012993 systemd-journald[992]: Received client request to flush runtime journal. May 8 00:51:29.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:29.986093 systemd[1]: Reached target first-boot-complete.target. May 8 00:51:29.988049 systemd[1]: Starting systemd-sysusers.service... May 8 00:51:29.995611 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:51:30.014290 udevadm[1031]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:51:29.996747 systemd[1]: Finished systemd-sysctl.service. May 8 00:51:29.998657 systemd[1]: Starting systemd-udev-settle.service... May 8 00:51:30.014791 systemd[1]: Finished systemd-journal-flush.service. May 8 00:51:30.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.015950 systemd[1]: Finished systemd-sysusers.service. May 8 00:51:30.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.017889 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:51:30.034231 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:51:30.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.348718 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:51:30.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.349000 audit: BPF prog-id=24 op=LOAD May 8 00:51:30.349000 audit: BPF prog-id=25 op=LOAD May 8 00:51:30.349000 audit: BPF prog-id=7 op=UNLOAD May 8 00:51:30.349000 audit: BPF prog-id=8 op=UNLOAD May 8 00:51:30.350912 systemd[1]: Starting systemd-udevd.service... May 8 00:51:30.371555 systemd-udevd[1035]: Using default interface naming scheme 'v252'. May 8 00:51:30.383221 systemd[1]: Started systemd-udevd.service. May 8 00:51:30.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.384000 audit: BPF prog-id=26 op=LOAD May 8 00:51:30.386270 systemd[1]: Starting systemd-networkd.service... May 8 00:51:30.398000 audit: BPF prog-id=27 op=LOAD May 8 00:51:30.398000 audit: BPF prog-id=28 op=LOAD May 8 00:51:30.398000 audit: BPF prog-id=29 op=LOAD May 8 00:51:30.399857 systemd[1]: Starting systemd-userdbd.service... May 8 00:51:30.406093 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 8 00:51:30.426537 systemd[1]: Started systemd-userdbd.service. May 8 00:51:30.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.435455 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:51:30.480034 systemd-networkd[1043]: lo: Link UP May 8 00:51:30.480296 systemd-networkd[1043]: lo: Gained carrier May 8 00:51:30.480754 systemd-networkd[1043]: Enumeration completed May 8 00:51:30.480947 systemd[1]: Started systemd-networkd.service. May 8 00:51:30.481050 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:51:30.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.482382 systemd-networkd[1043]: eth0: Link UP May 8 00:51:30.482548 systemd-networkd[1043]: eth0: Gained carrier May 8 00:51:30.488797 systemd[1]: Finished systemd-udev-settle.service. May 8 00:51:30.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.490794 systemd[1]: Starting lvm2-activation-early.service... May 8 00:51:30.500837 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:51:30.513545 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.127/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:51:30.538248 systemd[1]: Finished lvm2-activation-early.service. May 8 00:51:30.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.539238 systemd[1]: Reached target cryptsetup.target. May 8 00:51:30.541066 systemd[1]: Starting lvm2-activation.service... May 8 00:51:30.544385 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:51:30.575274 systemd[1]: Finished lvm2-activation.service. May 8 00:51:30.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.576213 systemd[1]: Reached target local-fs-pre.target. May 8 00:51:30.577054 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:51:30.577086 systemd[1]: Reached target local-fs.target. May 8 00:51:30.577871 systemd[1]: Reached target machines.target. May 8 00:51:30.579743 systemd[1]: Starting ldconfig.service... May 8 00:51:30.580910 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:51:30.580963 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:30.581948 systemd[1]: Starting systemd-boot-update.service... May 8 00:51:30.583842 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:51:30.586063 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:51:30.588134 systemd[1]: Starting systemd-sysext.service... May 8 00:51:30.590548 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1071 (bootctl) May 8 00:51:30.594232 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:51:30.599568 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:51:30.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.600989 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:51:30.605572 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:51:30.605760 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:51:30.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.652137 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:51:30.657921 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) May 8 00:51:30.657921 systemd-fsck[1080]: /dev/vda1: 236 files, 117182/258078 clusters May 8 00:51:30.659442 kernel: loop0: detected capacity change from 0 to 194096 May 8 00:51:30.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.660476 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:51:30.673415 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:51:30.703418 kernel: loop1: detected capacity change from 0 to 194096 May 8 00:51:30.707560 (sd-sysext)[1088]: Using extensions 'kubernetes'. May 8 00:51:30.708176 (sd-sysext)[1088]: Merged extensions into '/usr'. May 8 00:51:30.730635 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:51:30.732178 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:51:30.734297 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:51:30.736284 systemd[1]: Starting modprobe@loop.service... May 8 00:51:30.737204 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:51:30.737335 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:30.738209 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:51:30.738330 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:51:30.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.739926 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:51:30.740047 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:51:30.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.741616 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:51:30.741755 systemd[1]: Finished modprobe@loop.service. May 8 00:51:30.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.743332 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:51:30.743488 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:51:30.756511 ldconfig[1070]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:51:30.760464 systemd[1]: Finished ldconfig.service. May 8 00:51:30.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.941919 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:51:30.943755 systemd[1]: Mounting boot.mount... May 8 00:51:30.945587 systemd[1]: Mounting usr-share-oem.mount... May 8 00:51:30.951414 systemd[1]: Mounted boot.mount. May 8 00:51:30.952305 systemd[1]: Mounted usr-share-oem.mount. May 8 00:51:30.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.954114 systemd[1]: Finished systemd-sysext.service. May 8 00:51:30.956015 systemd[1]: Starting ensure-sysext.service... May 8 00:51:30.957897 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:51:30.960642 systemd[1]: Finished systemd-boot-update.service. May 8 00:51:30.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:30.963312 systemd[1]: Reloading. May 8 00:51:30.966692 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:51:30.967431 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:51:30.968743 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:51:30.994570 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2025-05-08T00:51:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:51:30.994612 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2025-05-08T00:51:30Z" level=info msg="torcx already run" May 8 00:51:31.058376 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:51:31.058478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:51:31.074723 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:51:31.117000 audit: BPF prog-id=30 op=LOAD May 8 00:51:31.117000 audit: BPF prog-id=21 op=UNLOAD May 8 00:51:31.117000 audit: BPF prog-id=31 op=LOAD May 8 00:51:31.117000 audit: BPF prog-id=32 op=LOAD May 8 00:51:31.117000 audit: BPF prog-id=22 op=UNLOAD May 8 00:51:31.117000 audit: BPF prog-id=23 op=UNLOAD May 8 00:51:31.117000 audit: BPF prog-id=33 op=LOAD May 8 00:51:31.117000 audit: BPF prog-id=34 op=LOAD May 8 00:51:31.117000 audit: BPF prog-id=24 op=UNLOAD May 8 00:51:31.117000 audit: BPF prog-id=25 op=UNLOAD May 8 00:51:31.119000 audit: BPF prog-id=35 op=LOAD May 8 00:51:31.119000 audit: BPF prog-id=26 op=UNLOAD May 8 00:51:31.119000 audit: BPF prog-id=36 op=LOAD May 8 00:51:31.119000 audit: BPF prog-id=27 op=UNLOAD May 8 00:51:31.120000 audit: BPF prog-id=37 op=LOAD May 8 00:51:31.120000 audit: BPF prog-id=38 op=LOAD May 8 00:51:31.120000 audit: BPF prog-id=28 op=UNLOAD May 8 00:51:31.120000 audit: BPF prog-id=29 op=UNLOAD May 8 00:51:31.122553 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:51:31.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.126928 systemd[1]: Starting audit-rules.service... May 8 00:51:31.128781 systemd[1]: Starting clean-ca-certificates.service... May 8 00:51:31.134000 audit: BPF prog-id=39 op=LOAD May 8 00:51:31.130914 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:51:31.135809 systemd[1]: Starting systemd-resolved.service... May 8 00:51:31.137000 audit: BPF prog-id=40 op=LOAD May 8 00:51:31.142098 systemd[1]: Starting systemd-timesyncd.service... May 8 00:51:31.145272 systemd[1]: Starting systemd-update-utmp.service... May 8 00:51:31.152434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:51:31.153635 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:51:31.155450 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:51:31.157285 systemd[1]: Starting modprobe@loop.service... May 8 00:51:31.156000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:51:31.158076 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:51:31.158209 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:31.159170 systemd[1]: Finished clean-ca-certificates.service. May 8 00:51:31.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.160663 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:51:31.160781 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:51:31.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.162038 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:51:31.162149 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:51:31.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.163554 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:51:31.163665 systemd[1]: Finished modprobe@loop.service. May 8 00:51:31.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.166756 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:51:31.169071 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:51:31.171641 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:51:31.173732 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:51:31.175739 systemd[1]: Starting modprobe@loop.service... May 8 00:51:31.176470 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:51:31.176661 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:31.178018 systemd[1]: Starting systemd-update-done.service... May 8 00:51:31.178897 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:51:31.180265 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:51:31.180458 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:51:31.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.181751 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:51:31.181868 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:51:31.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.183169 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:51:31.183284 systemd[1]: Finished modprobe@loop.service. May 8 00:51:31.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.184629 systemd[1]: Finished systemd-update-done.service. May 8 00:51:31.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.188425 systemd[1]: Finished systemd-update-utmp.service. May 8 00:51:31.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:31.191119 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:51:31.197331 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:51:31.199699 systemd[1]: Starting modprobe@drm.service... May 8 00:51:31.201623 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:51:31.203711 systemd[1]: Starting modprobe@loop.service... May 8 00:51:31.204576 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:51:31.204652 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:31.205000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:51:31.205000 audit[1181]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcce2a800 a2=420 a3=0 items=0 ppid=1154 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:31.205000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:51:31.205738 augenrules[1181]: No rules May 8 00:51:31.205775 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:51:31.206824 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:51:31.207328 systemd[1]: Started systemd-timesyncd.service. May 8 00:51:31.208594 systemd[1]: Finished ensure-sysext.service. May 8 00:51:31.209135 systemd-timesyncd[1159]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:51:31.209193 systemd-timesyncd[1159]: Initial clock synchronization to Thu 2025-05-08 00:51:31.606176 UTC. May 8 00:51:31.209938 systemd[1]: Finished audit-rules.service. May 8 00:51:31.211102 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:51:31.211227 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:51:31.212566 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:51:31.212689 systemd[1]: Finished modprobe@drm.service. May 8 00:51:31.213750 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:51:31.213864 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:51:31.214983 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:51:31.215094 systemd[1]: Finished modprobe@loop.service. May 8 00:51:31.217556 systemd[1]: Reached target time-set.target. May 8 00:51:31.218353 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:51:31.218422 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:51:31.226006 systemd-resolved[1158]: Positive Trust Anchors: May 8 00:51:31.226243 systemd-resolved[1158]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:51:31.226326 systemd-resolved[1158]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:51:31.238453 systemd-resolved[1158]: Defaulting to hostname 'linux'. May 8 00:51:31.239887 systemd[1]: Started systemd-resolved.service. May 8 00:51:31.240726 systemd[1]: Reached target network.target. May 8 00:51:31.241461 systemd[1]: Reached target nss-lookup.target. May 8 00:51:31.242205 systemd[1]: Reached target sysinit.target. May 8 00:51:31.243037 systemd[1]: Started motdgen.path. May 8 00:51:31.243774 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:51:31.245019 systemd[1]: Started logrotate.timer. May 8 00:51:31.245842 systemd[1]: Started mdadm.timer. May 8 00:51:31.246518 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:51:31.247309 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:51:31.247342 systemd[1]: Reached target paths.target. May 8 00:51:31.248110 systemd[1]: Reached target timers.target. May 8 00:51:31.249183 systemd[1]: Listening on dbus.socket. May 8 00:51:31.250966 systemd[1]: Starting docker.socket... May 8 00:51:31.254193 systemd[1]: Listening on sshd.socket. May 8 00:51:31.255062 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:31.255547 systemd[1]: Listening on docker.socket. May 8 00:51:31.256373 systemd[1]: Reached target sockets.target. May 8 00:51:31.257128 systemd[1]: Reached target basic.target. May 8 00:51:31.257934 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:51:31.257974 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:51:31.259053 systemd[1]: Starting containerd.service... May 8 00:51:31.260963 systemd[1]: Starting dbus.service... May 8 00:51:31.262633 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:51:31.264529 systemd[1]: Starting extend-filesystems.service... May 8 00:51:31.265461 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:51:31.267150 systemd[1]: Starting motdgen.service... May 8 00:51:31.269570 systemd[1]: Starting prepare-helm.service... May 8 00:51:31.275492 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:51:31.277697 systemd[1]: Starting sshd-keygen.service... May 8 00:51:31.280833 systemd[1]: Starting systemd-logind.service... May 8 00:51:31.281646 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:51:31.281797 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:51:31.282404 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:51:31.283704 systemd[1]: Starting update-engine.service... May 8 00:51:31.286078 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:51:31.303162 jq[1210]: true May 8 00:51:31.306182 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:51:31.307934 jq[1196]: false May 8 00:51:31.306384 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:51:31.307923 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:51:31.308066 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:51:31.315022 extend-filesystems[1197]: Found loop1 May 8 00:51:31.315022 extend-filesystems[1197]: Found vda May 8 00:51:31.320078 extend-filesystems[1197]: Found vda1 May 8 00:51:31.320078 extend-filesystems[1197]: Found vda2 May 8 00:51:31.320078 extend-filesystems[1197]: Found vda3 May 8 00:51:31.320078 extend-filesystems[1197]: Found usr May 8 00:51:31.320078 extend-filesystems[1197]: Found vda4 May 8 00:51:31.320078 extend-filesystems[1197]: Found vda6 May 8 00:51:31.320078 extend-filesystems[1197]: Found vda7 May 8 00:51:31.320078 extend-filesystems[1197]: Found vda9 May 8 00:51:31.320078 extend-filesystems[1197]: Checking size of /dev/vda9 May 8 00:51:31.339607 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:51:31.343064 extend-filesystems[1197]: Resized partition /dev/vda9 May 8 00:51:31.339819 systemd[1]: Finished motdgen.service. May 8 00:51:31.359485 jq[1218]: true May 8 00:51:31.389711 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:51:31.390359 dbus-daemon[1195]: [system] SELinux support is enabled May 8 00:51:31.390930 systemd[1]: Started dbus.service. May 8 00:51:31.393456 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:51:31.393494 systemd[1]: Reached target system-config.target. May 8 00:51:31.394325 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:51:31.394356 systemd[1]: Reached target user-config.target. May 8 00:51:31.398076 tar[1213]: linux-arm64/helm May 8 00:51:31.398542 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:51:31.421427 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:51:31.447914 systemd-logind[1205]: Watching system buttons on /dev/input/event0 (Power Button) May 8 00:51:31.451767 extend-filesystems[1226]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:51:31.451767 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:51:31.451767 extend-filesystems[1226]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:51:31.469481 extend-filesystems[1197]: Resized filesystem in /dev/vda9 May 8 00:51:31.452641 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:51:31.470582 bash[1241]: Updated "/home/core/.ssh/authorized_keys" May 8 00:51:31.470664 update_engine[1208]: I0508 00:51:31.444931 1208 main.cc:92] Flatcar Update Engine starting May 8 00:51:31.470664 update_engine[1208]: I0508 00:51:31.457983 1208 update_check_scheduler.cc:74] Next update check in 7m57s May 8 00:51:31.452800 systemd[1]: Finished extend-filesystems.service. May 8 00:51:31.456686 systemd-logind[1205]: New seat seat0. May 8 00:51:31.459184 systemd[1]: Started update-engine.service. May 8 00:51:31.463030 systemd[1]: Started systemd-logind.service. May 8 00:51:31.464270 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:51:31.467105 systemd[1]: Started locksmithd.service. May 8 00:51:31.524591 env[1219]: time="2025-05-08T00:51:31.523551280Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:51:31.540395 env[1219]: time="2025-05-08T00:51:31.540352440Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:51:31.540576 env[1219]: time="2025-05-08T00:51:31.540518040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.541793 env[1219]: time="2025-05-08T00:51:31.541740680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:51:31.541793 env[1219]: time="2025-05-08T00:51:31.541774680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.542001 env[1219]: time="2025-05-08T00:51:31.541970120Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:51:31.542001 env[1219]: time="2025-05-08T00:51:31.541994520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.542068 env[1219]: time="2025-05-08T00:51:31.542007440Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:51:31.542068 env[1219]: time="2025-05-08T00:51:31.542016720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.542111 env[1219]: time="2025-05-08T00:51:31.542088240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.542298 env[1219]: time="2025-05-08T00:51:31.542271840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:51:31.542451 env[1219]: time="2025-05-08T00:51:31.542430240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:51:31.542492 env[1219]: time="2025-05-08T00:51:31.542451280Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:51:31.542518 env[1219]: time="2025-05-08T00:51:31.542510160Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:51:31.542552 env[1219]: time="2025-05-08T00:51:31.542521680Z" level=info msg="metadata content store policy set" policy=shared May 8 00:51:31.549666 env[1219]: time="2025-05-08T00:51:31.549632320Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:51:31.549720 env[1219]: time="2025-05-08T00:51:31.549668560Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:51:31.549720 env[1219]: time="2025-05-08T00:51:31.549681760Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:51:31.549785 env[1219]: time="2025-05-08T00:51:31.549720040Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:51:31.549785 env[1219]: time="2025-05-08T00:51:31.549733800Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:51:31.549785 env[1219]: time="2025-05-08T00:51:31.549746880Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:51:31.549785 env[1219]: time="2025-05-08T00:51:31.549759280Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550156 env[1219]: time="2025-05-08T00:51:31.550126720Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550188 env[1219]: time="2025-05-08T00:51:31.550154880Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550188 env[1219]: time="2025-05-08T00:51:31.550168480Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550188 env[1219]: time="2025-05-08T00:51:31.550180240Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550248 env[1219]: time="2025-05-08T00:51:31.550192920Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:51:31.550316 env[1219]: time="2025-05-08T00:51:31.550299160Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:51:31.550403 env[1219]: time="2025-05-08T00:51:31.550374600Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:51:31.550653 env[1219]: time="2025-05-08T00:51:31.550635120Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:51:31.550696 env[1219]: time="2025-05-08T00:51:31.550664200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550696 env[1219]: time="2025-05-08T00:51:31.550683360Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:51:31.550803 env[1219]: time="2025-05-08T00:51:31.550788760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550836 env[1219]: time="2025-05-08T00:51:31.550805360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550836 env[1219]: time="2025-05-08T00:51:31.550817840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550836 env[1219]: time="2025-05-08T00:51:31.550828400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550902 env[1219]: time="2025-05-08T00:51:31.550884160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550902 env[1219]: time="2025-05-08T00:51:31.550898640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550940 env[1219]: time="2025-05-08T00:51:31.550910800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550940 env[1219]: time="2025-05-08T00:51:31.550921960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:51:31.550940 env[1219]: time="2025-05-08T00:51:31.550933440Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:51:31.551064 env[1219]: time="2025-05-08T00:51:31.551048080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:51:31.551094 env[1219]: time="2025-05-08T00:51:31.551068720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:51:31.551094 env[1219]: time="2025-05-08T00:51:31.551081080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:51:31.551132 env[1219]: time="2025-05-08T00:51:31.551093720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:51:31.551132 env[1219]: time="2025-05-08T00:51:31.551107000Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:51:31.551132 env[1219]: time="2025-05-08T00:51:31.551116880Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:51:31.551200 env[1219]: time="2025-05-08T00:51:31.551132960Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:51:31.551200 env[1219]: time="2025-05-08T00:51:31.551164280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:51:31.551399 env[1219]: time="2025-05-08T00:51:31.551336760Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:51:31.551945 env[1219]: time="2025-05-08T00:51:31.551417040Z" level=info msg="Connect containerd service" May 8 00:51:31.551945 env[1219]: time="2025-05-08T00:51:31.551449720Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:51:31.552198 env[1219]: time="2025-05-08T00:51:31.552175040Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:51:31.552378 env[1219]: time="2025-05-08T00:51:31.552355280Z" level=info msg="Start subscribing containerd event" May 8 00:51:31.552425 env[1219]: time="2025-05-08T00:51:31.552406680Z" level=info msg="Start recovering state" May 8 00:51:31.552504 env[1219]: time="2025-05-08T00:51:31.552466440Z" level=info msg="Start event monitor" May 8 00:51:31.552504 env[1219]: time="2025-05-08T00:51:31.552501600Z" level=info msg="Start snapshots syncer" May 8 00:51:31.552563 env[1219]: time="2025-05-08T00:51:31.552513200Z" level=info msg="Start cni network conf syncer for default" May 8 00:51:31.552563 env[1219]: time="2025-05-08T00:51:31.552520800Z" level=info msg="Start streaming server" May 8 00:51:31.552889 env[1219]: time="2025-05-08T00:51:31.552835640Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:51:31.552935 env[1219]: time="2025-05-08T00:51:31.552899840Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:51:31.554042 env[1219]: time="2025-05-08T00:51:31.552989120Z" level=info msg="containerd successfully booted in 0.031026s" May 8 00:51:31.553065 systemd[1]: Started containerd.service. May 8 00:51:31.562466 locksmithd[1249]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:51:31.772974 tar[1213]: linux-arm64/LICENSE May 8 00:51:31.772974 tar[1213]: linux-arm64/README.md May 8 00:51:31.777004 systemd[1]: Finished prepare-helm.service. May 8 00:51:31.983512 systemd-networkd[1043]: eth0: Gained IPv6LL May 8 00:51:31.985083 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:51:31.986272 systemd[1]: Reached target network-online.target. May 8 00:51:31.988668 systemd[1]: Starting kubelet.service... May 8 00:51:32.574715 systemd[1]: Started kubelet.service. May 8 00:51:33.085593 kubelet[1263]: E0508 00:51:33.085548 1263 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:51:33.087920 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:51:33.088043 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:51:33.163143 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:51:33.183774 systemd[1]: Finished sshd-keygen.service. May 8 00:51:33.186190 systemd[1]: Starting issuegen.service... May 8 00:51:33.191071 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:51:33.191247 systemd[1]: Finished issuegen.service. May 8 00:51:33.193731 systemd[1]: Starting systemd-user-sessions.service... May 8 00:51:33.200407 systemd[1]: Finished systemd-user-sessions.service. May 8 00:51:33.202899 systemd[1]: Started getty@tty1.service. May 8 00:51:33.205133 systemd[1]: Started serial-getty@ttyAMA0.service. May 8 00:51:33.206295 systemd[1]: Reached target getty.target. May 8 00:51:33.207193 systemd[1]: Reached target multi-user.target. May 8 00:51:33.209690 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:51:33.217006 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:51:33.217193 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:51:33.218337 systemd[1]: Startup finished in 578ms (kernel) + 4.348s (initrd) + 5.298s (userspace) = 10.225s. May 8 00:51:35.906151 systemd[1]: Created slice system-sshd.slice. May 8 00:51:35.907241 systemd[1]: Started sshd@0-10.0.0.127:22-10.0.0.1:36216.service. May 8 00:51:35.953813 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 36216 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:35.956402 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:35.973251 systemd-logind[1205]: New session 1 of user core. May 8 00:51:35.974204 systemd[1]: Created slice user-500.slice. May 8 00:51:35.975488 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:51:35.984200 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:51:35.985494 systemd[1]: Starting user@500.service... May 8 00:51:35.988555 (systemd)[1289]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.049318 systemd[1289]: Queued start job for default target default.target. May 8 00:51:36.049856 systemd[1289]: Reached target paths.target. May 8 00:51:36.049878 systemd[1289]: Reached target sockets.target. May 8 00:51:36.049890 systemd[1289]: Reached target timers.target. May 8 00:51:36.049900 systemd[1289]: Reached target basic.target. May 8 00:51:36.049954 systemd[1289]: Reached target default.target. May 8 00:51:36.049981 systemd[1289]: Startup finished in 56ms. May 8 00:51:36.050036 systemd[1]: Started user@500.service. May 8 00:51:36.051085 systemd[1]: Started session-1.scope. May 8 00:51:36.104473 systemd[1]: Started sshd@1-10.0.0.127:22-10.0.0.1:36226.service. May 8 00:51:36.147546 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 36226 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.148745 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.152180 systemd-logind[1205]: New session 2 of user core. May 8 00:51:36.153355 systemd[1]: Started session-2.scope. May 8 00:51:36.209111 sshd[1298]: pam_unix(sshd:session): session closed for user core May 8 00:51:36.213194 systemd[1]: sshd@1-10.0.0.127:22-10.0.0.1:36226.service: Deactivated successfully. May 8 00:51:36.213948 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:51:36.214543 systemd-logind[1205]: Session 2 logged out. Waiting for processes to exit. May 8 00:51:36.215699 systemd[1]: Started sshd@2-10.0.0.127:22-10.0.0.1:36242.service. May 8 00:51:36.216491 systemd-logind[1205]: Removed session 2. May 8 00:51:36.257093 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 36242 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.258357 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.261914 systemd-logind[1205]: New session 3 of user core. May 8 00:51:36.262863 systemd[1]: Started session-3.scope. May 8 00:51:36.313593 sshd[1304]: pam_unix(sshd:session): session closed for user core May 8 00:51:36.316517 systemd[1]: sshd@2-10.0.0.127:22-10.0.0.1:36242.service: Deactivated successfully. May 8 00:51:36.317154 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:51:36.317662 systemd-logind[1205]: Session 3 logged out. Waiting for processes to exit. May 8 00:51:36.318730 systemd[1]: Started sshd@3-10.0.0.127:22-10.0.0.1:36250.service. May 8 00:51:36.319329 systemd-logind[1205]: Removed session 3. May 8 00:51:36.358884 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 36250 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.360026 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.363203 systemd-logind[1205]: New session 4 of user core. May 8 00:51:36.364072 systemd[1]: Started session-4.scope. May 8 00:51:36.419908 sshd[1311]: pam_unix(sshd:session): session closed for user core May 8 00:51:36.423220 systemd[1]: sshd@3-10.0.0.127:22-10.0.0.1:36250.service: Deactivated successfully. May 8 00:51:36.423980 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:51:36.424606 systemd-logind[1205]: Session 4 logged out. Waiting for processes to exit. May 8 00:51:36.426120 systemd[1]: Started sshd@4-10.0.0.127:22-10.0.0.1:36260.service. May 8 00:51:36.426965 systemd-logind[1205]: Removed session 4. May 8 00:51:36.467964 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 36260 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.468537 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.472104 systemd-logind[1205]: New session 5 of user core. May 8 00:51:36.473599 systemd[1]: Started session-5.scope. May 8 00:51:36.534701 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:51:36.534933 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:51:36.547614 dbus-daemon[1195]: avc: received setenforce notice (enforcing=1) May 8 00:51:36.549464 sudo[1320]: pam_unix(sudo:session): session closed for user root May 8 00:51:36.551691 sshd[1317]: pam_unix(sshd:session): session closed for user core May 8 00:51:36.555750 systemd[1]: sshd@4-10.0.0.127:22-10.0.0.1:36260.service: Deactivated successfully. May 8 00:51:36.556509 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:51:36.557184 systemd-logind[1205]: Session 5 logged out. Waiting for processes to exit. May 8 00:51:36.558987 systemd[1]: Started sshd@5-10.0.0.127:22-10.0.0.1:36264.service. May 8 00:51:36.559896 systemd-logind[1205]: Removed session 5. May 8 00:51:36.601204 sshd[1324]: Accepted publickey for core from 10.0.0.1 port 36264 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.602516 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.605650 systemd-logind[1205]: New session 6 of user core. May 8 00:51:36.607039 systemd[1]: Started session-6.scope. May 8 00:51:36.660201 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:51:36.660449 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:51:36.663155 sudo[1328]: pam_unix(sudo:session): session closed for user root May 8 00:51:36.667281 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:51:36.667762 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:51:36.676152 systemd[1]: Stopping audit-rules.service... May 8 00:51:36.675000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:51:36.677485 auditctl[1331]: No rules May 8 00:51:36.677863 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:51:36.677956 kernel: kauditd_printk_skb: 132 callbacks suppressed May 8 00:51:36.677982 kernel: audit: type=1305 audit(1746665496.675:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:51:36.678013 systemd[1]: Stopped audit-rules.service. May 8 00:51:36.679353 systemd[1]: Starting audit-rules.service... May 8 00:51:36.675000 audit[1331]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc5b925e0 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:36.683196 kernel: audit: type=1300 audit(1746665496.675:208): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc5b925e0 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:36.683246 kernel: audit: type=1327 audit(1746665496.675:208): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:51:36.675000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:51:36.686103 kernel: audit: type=1131 audit(1746665496.676:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.694445 augenrules[1348]: No rules May 8 00:51:36.695030 systemd[1]: Finished audit-rules.service. May 8 00:51:36.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.697952 sudo[1327]: pam_unix(sudo:session): session closed for user root May 8 00:51:36.698493 kernel: audit: type=1130 audit(1746665496.694:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.697000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.699253 sshd[1324]: pam_unix(sshd:session): session closed for user core May 8 00:51:36.697000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.701929 systemd[1]: sshd@5-10.0.0.127:22-10.0.0.1:36264.service: Deactivated successfully. May 8 00:51:36.702623 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:51:36.703206 systemd-logind[1205]: Session 6 logged out. Waiting for processes to exit. May 8 00:51:36.704160 systemd[1]: Started sshd@6-10.0.0.127:22-10.0.0.1:36278.service. May 8 00:51:36.704576 kernel: audit: type=1106 audit(1746665496.697:211): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.704629 kernel: audit: type=1104 audit(1746665496.697:212): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.704647 kernel: audit: type=1106 audit(1746665496.697:213): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.697000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.704997 systemd-logind[1205]: Removed session 6. May 8 00:51:36.697000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.710695 kernel: audit: type=1104 audit(1746665496.697:214): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.710724 kernel: audit: type=1131 audit(1746665496.701:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.127:22-10.0.0.1:36264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.127:22-10.0.0.1:36264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:36278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:36.743000 audit[1354]: USER_ACCT pid=1354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.745189 sshd[1354]: Accepted publickey for core from 10.0.0.1 port 36278 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:51:36.744000 audit[1354]: CRED_ACQ pid=1354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.745000 audit[1354]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaf714f0 a2=3 a3=1 items=0 ppid=1 pid=1354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:36.745000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:51:36.746735 sshd[1354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:51:36.749967 systemd-logind[1205]: New session 7 of user core. May 8 00:51:36.750739 systemd[1]: Started session-7.scope. May 8 00:51:36.753000 audit[1354]: USER_START pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.754000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:51:36.804047 sudo[1357]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:51:36.804280 sudo[1357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:51:36.802000 audit[1357]: USER_ACCT pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.802000 audit[1357]: CRED_REFR pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.804000 audit[1357]: USER_START pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:51:36.873203 systemd[1]: Starting docker.service... May 8 00:51:36.980466 env[1369]: time="2025-05-08T00:51:36.980392324Z" level=info msg="Starting up" May 8 00:51:36.982090 env[1369]: time="2025-05-08T00:51:36.982054358Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:51:36.982090 env[1369]: time="2025-05-08T00:51:36.982082020Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:51:36.982154 env[1369]: time="2025-05-08T00:51:36.982099844Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:51:36.982154 env[1369]: time="2025-05-08T00:51:36.982110465Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:51:36.985670 env[1369]: time="2025-05-08T00:51:36.985641669Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:51:36.985761 env[1369]: time="2025-05-08T00:51:36.985745525Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:51:36.985824 env[1369]: time="2025-05-08T00:51:36.985808218Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:51:36.985877 env[1369]: time="2025-05-08T00:51:36.985864283Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:51:37.139237 env[1369]: time="2025-05-08T00:51:37.139135477Z" level=info msg="Loading containers: start." May 8 00:51:37.186000 audit[1403]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.186000 audit[1403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc1e02860 a2=0 a3=1 items=0 ppid=1369 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:51:37.188000 audit[1405]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.188000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc87afb80 a2=0 a3=1 items=0 ppid=1369 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:51:37.190000 audit[1407]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.190000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcf3fd4b0 a2=0 a3=1 items=0 ppid=1369 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:51:37.192000 audit[1409]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.192000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe2433700 a2=0 a3=1 items=0 ppid=1369 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.192000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:51:37.194000 audit[1411]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.194000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd5888bd0 a2=0 a3=1 items=0 ppid=1369 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:51:37.217000 audit[1416]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.217000 audit[1416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc434f0a0 a2=0 a3=1 items=0 ppid=1369 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:51:37.223000 audit[1418]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.223000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc7c83090 a2=0 a3=1 items=0 ppid=1369 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.223000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:51:37.225000 audit[1420]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.225000 audit[1420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc097d960 a2=0 a3=1 items=0 ppid=1369 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:51:37.227000 audit[1422]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.227000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe4baad20 a2=0 a3=1 items=0 ppid=1369 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:51:37.233000 audit[1426]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.233000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc3797ba0 a2=0 a3=1 items=0 ppid=1369 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:51:37.249000 audit[1427]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.249000 audit[1427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffffadf500 a2=0 a3=1 items=0 ppid=1369 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:51:37.258455 kernel: Initializing XFRM netlink socket May 8 00:51:37.281723 env[1369]: time="2025-05-08T00:51:37.281684522Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:51:37.297000 audit[1435]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.297000 audit[1435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd5daad60 a2=0 a3=1 items=0 ppid=1369 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:51:37.315000 audit[1438]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.315000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcd54ffc0 a2=0 a3=1 items=0 ppid=1369 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:51:37.318000 audit[1441]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.318000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffc0ae000 a2=0 a3=1 items=0 ppid=1369 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:51:37.320000 audit[1443]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.320000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd58f3c20 a2=0 a3=1 items=0 ppid=1369 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:51:37.323000 audit[1445]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.323000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffea1c4850 a2=0 a3=1 items=0 ppid=1369 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.323000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:51:37.326000 audit[1447]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.326000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc0dd15c0 a2=0 a3=1 items=0 ppid=1369 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:51:37.327000 audit[1449]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.327000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc3de9830 a2=0 a3=1 items=0 ppid=1369 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:51:37.336000 audit[1452]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.336000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd00a3fb0 a2=0 a3=1 items=0 ppid=1369 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:51:37.337000 audit[1454]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.337000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc647cc70 a2=0 a3=1 items=0 ppid=1369 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:51:37.339000 audit[1456]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.339000 audit[1456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffef58b6e0 a2=0 a3=1 items=0 ppid=1369 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:51:37.340000 audit[1458]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.340000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffad7fce0 a2=0 a3=1 items=0 ppid=1369 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:51:37.342873 systemd-networkd[1043]: docker0: Link UP May 8 00:51:37.348000 audit[1462]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.348000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffea2e1e40 a2=0 a3=1 items=0 ppid=1369 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:51:37.364000 audit[1463]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:37.364000 audit[1463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdd0b3af0 a2=0 a3=1 items=0 ppid=1369 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:37.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:51:37.365679 env[1369]: time="2025-05-08T00:51:37.365651107Z" level=info msg="Loading containers: done." May 8 00:51:37.381912 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2279206889-merged.mount: Deactivated successfully. May 8 00:51:37.385717 env[1369]: time="2025-05-08T00:51:37.385672032Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:51:37.385863 env[1369]: time="2025-05-08T00:51:37.385834506Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:51:37.385962 env[1369]: time="2025-05-08T00:51:37.385940333Z" level=info msg="Daemon has completed initialization" May 8 00:51:37.401735 systemd[1]: Started docker.service. May 8 00:51:37.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:37.408383 env[1369]: time="2025-05-08T00:51:37.408336347Z" level=info msg="API listen on /run/docker.sock" May 8 00:51:38.062520 env[1219]: time="2025-05-08T00:51:38.062460508Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 8 00:51:38.700029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2751166518.mount: Deactivated successfully. May 8 00:51:40.397675 env[1219]: time="2025-05-08T00:51:40.397613138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:40.398900 env[1219]: time="2025-05-08T00:51:40.398868145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:40.400743 env[1219]: time="2025-05-08T00:51:40.400714509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:40.402603 env[1219]: time="2025-05-08T00:51:40.402570190Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:40.403545 env[1219]: time="2025-05-08T00:51:40.403517883Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6\"" May 8 00:51:40.415101 env[1219]: time="2025-05-08T00:51:40.415069529Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 8 00:51:42.384510 env[1219]: time="2025-05-08T00:51:42.384456984Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:42.385836 env[1219]: time="2025-05-08T00:51:42.385806054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:42.388436 env[1219]: time="2025-05-08T00:51:42.388381777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:42.390067 env[1219]: time="2025-05-08T00:51:42.390036912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:42.390814 env[1219]: time="2025-05-08T00:51:42.390775351Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14\"" May 8 00:51:42.400087 env[1219]: time="2025-05-08T00:51:42.400043300Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 8 00:51:43.142776 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:51:43.143831 kernel: kauditd_printk_skb: 84 callbacks suppressed May 8 00:51:43.143893 kernel: audit: type=1130 audit(1746665503.141:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.142952 systemd[1]: Stopped kubelet.service. May 8 00:51:43.144475 systemd[1]: Starting kubelet.service... May 8 00:51:43.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.148768 kernel: audit: type=1131 audit(1746665503.141:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.230798 systemd[1]: Started kubelet.service. May 8 00:51:43.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.234440 kernel: audit: type=1130 audit(1746665503.229:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:43.275016 kubelet[1524]: E0508 00:51:43.274850 1524 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:51:43.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:51:43.277527 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:51:43.277654 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:51:43.281429 kernel: audit: type=1131 audit(1746665503.277:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:51:43.686877 env[1219]: time="2025-05-08T00:51:43.686810602Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:43.688228 env[1219]: time="2025-05-08T00:51:43.688183067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:43.690578 env[1219]: time="2025-05-08T00:51:43.690533420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:43.692220 env[1219]: time="2025-05-08T00:51:43.692184311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:43.693870 env[1219]: time="2025-05-08T00:51:43.693833462Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba\"" May 8 00:51:43.703256 env[1219]: time="2025-05-08T00:51:43.703219257Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 8 00:51:44.866847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3302036785.mount: Deactivated successfully. May 8 00:51:45.292931 env[1219]: time="2025-05-08T00:51:45.292869622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:45.294257 env[1219]: time="2025-05-08T00:51:45.294232925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:45.295935 env[1219]: time="2025-05-08T00:51:45.295740439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:45.297199 env[1219]: time="2025-05-08T00:51:45.297155955Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:45.297593 env[1219]: time="2025-05-08T00:51:45.297565870Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 8 00:51:45.306844 env[1219]: time="2025-05-08T00:51:45.306783289Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 8 00:51:45.893203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount229047430.mount: Deactivated successfully. May 8 00:51:46.935366 env[1219]: time="2025-05-08T00:51:46.935287552Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:46.937464 env[1219]: time="2025-05-08T00:51:46.937427368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:46.939031 env[1219]: time="2025-05-08T00:51:46.939007814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:46.941532 env[1219]: time="2025-05-08T00:51:46.941503654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:46.942256 env[1219]: time="2025-05-08T00:51:46.942223724Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 8 00:51:46.951543 env[1219]: time="2025-05-08T00:51:46.951511763Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 8 00:51:47.499875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount874060257.mount: Deactivated successfully. May 8 00:51:47.504292 env[1219]: time="2025-05-08T00:51:47.504231016Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:47.506136 env[1219]: time="2025-05-08T00:51:47.505600326Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:47.507117 env[1219]: time="2025-05-08T00:51:47.507065596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:47.508951 env[1219]: time="2025-05-08T00:51:47.508896981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:47.509420 env[1219]: time="2025-05-08T00:51:47.509354102Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" May 8 00:51:47.520185 env[1219]: time="2025-05-08T00:51:47.519978149Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 8 00:51:48.059596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3162152491.mount: Deactivated successfully. May 8 00:51:50.778503 env[1219]: time="2025-05-08T00:51:50.778452197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:50.780359 env[1219]: time="2025-05-08T00:51:50.780321587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:50.782272 env[1219]: time="2025-05-08T00:51:50.782236019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:50.785281 env[1219]: time="2025-05-08T00:51:50.785236583Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:50.786306 env[1219]: time="2025-05-08T00:51:50.785728460Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" May 8 00:51:53.391942 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:51:53.392119 systemd[1]: Stopped kubelet.service. May 8 00:51:53.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.393804 systemd[1]: Starting kubelet.service... May 8 00:51:53.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.397581 kernel: audit: type=1130 audit(1746665513.391:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.397654 kernel: audit: type=1131 audit(1746665513.391:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.481186 systemd[1]: Started kubelet.service. May 8 00:51:53.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.484424 kernel: audit: type=1130 audit(1746665513.480:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:53.520330 kubelet[1638]: E0508 00:51:53.520283 1638 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:51:53.522329 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:51:53.522481 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:51:53.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:51:53.525406 kernel: audit: type=1131 audit(1746665513.521:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:51:55.161237 systemd[1]: Stopped kubelet.service. May 8 00:51:55.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.163903 systemd[1]: Starting kubelet.service... May 8 00:51:55.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.166662 kernel: audit: type=1130 audit(1746665515.161:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.166723 kernel: audit: type=1131 audit(1746665515.161:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.182344 systemd[1]: Reloading. May 8 00:51:55.236620 /usr/lib/systemd/system-generators/torcx-generator[1673]: time="2025-05-08T00:51:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:51:55.236650 /usr/lib/systemd/system-generators/torcx-generator[1673]: time="2025-05-08T00:51:55Z" level=info msg="torcx already run" May 8 00:51:55.390149 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:51:55.390170 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:51:55.407037 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:51:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.467084 kernel: audit: type=1400 audit(1746665515.460:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.467134 kernel: audit: type=1400 audit(1746665515.460:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.467154 kernel: audit: type=1400 audit(1746665515.460:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.469425 kernel: audit: type=1400 audit(1746665515.460:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit: BPF prog-id=46 op=LOAD May 8 00:51:55.463000 audit: BPF prog-id=41 op=UNLOAD May 8 00:51:55.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit: BPF prog-id=47 op=LOAD May 8 00:51:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.467000 audit: BPF prog-id=48 op=LOAD May 8 00:51:55.468000 audit: BPF prog-id=42 op=UNLOAD May 8 00:51:55.468000 audit: BPF prog-id=43 op=UNLOAD May 8 00:51:55.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit: BPF prog-id=49 op=LOAD May 8 00:51:55.470000 audit: BPF prog-id=30 op=UNLOAD May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit: BPF prog-id=50 op=LOAD May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit: BPF prog-id=51 op=LOAD May 8 00:51:55.470000 audit: BPF prog-id=31 op=UNLOAD May 8 00:51:55.470000 audit: BPF prog-id=32 op=UNLOAD May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit: BPF prog-id=52 op=LOAD May 8 00:51:55.471000 audit: BPF prog-id=39 op=UNLOAD May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit: BPF prog-id=53 op=LOAD May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.471000 audit: BPF prog-id=54 op=LOAD May 8 00:51:55.471000 audit: BPF prog-id=33 op=UNLOAD May 8 00:51:55.471000 audit: BPF prog-id=34 op=UNLOAD May 8 00:51:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.472000 audit: BPF prog-id=55 op=LOAD May 8 00:51:55.472000 audit: BPF prog-id=40 op=UNLOAD May 8 00:51:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.473000 audit: BPF prog-id=56 op=LOAD May 8 00:51:55.473000 audit: BPF prog-id=35 op=UNLOAD May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit: BPF prog-id=57 op=LOAD May 8 00:51:55.474000 audit: BPF prog-id=36 op=UNLOAD May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit: BPF prog-id=58 op=LOAD May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.474000 audit: BPF prog-id=59 op=LOAD May 8 00:51:55.474000 audit: BPF prog-id=37 op=UNLOAD May 8 00:51:55.474000 audit: BPF prog-id=38 op=UNLOAD May 8 00:51:55.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:55.475000 audit: BPF prog-id=60 op=LOAD May 8 00:51:55.475000 audit: BPF prog-id=44 op=UNLOAD May 8 00:51:55.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.486935 systemd[1]: Started kubelet.service. May 8 00:51:55.488532 systemd[1]: Stopping kubelet.service... May 8 00:51:55.488796 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:51:55.488981 systemd[1]: Stopped kubelet.service. May 8 00:51:55.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.490635 systemd[1]: Starting kubelet.service... May 8 00:51:55.574490 systemd[1]: Started kubelet.service. May 8 00:51:55.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:51:55.619822 kubelet[1718]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:51:55.619822 kubelet[1718]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:51:55.619822 kubelet[1718]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:51:55.620999 kubelet[1718]: I0508 00:51:55.620946 1718 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:51:56.145542 kubelet[1718]: I0508 00:51:56.145502 1718 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 8 00:51:56.145542 kubelet[1718]: I0508 00:51:56.145532 1718 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:51:56.145747 kubelet[1718]: I0508 00:51:56.145732 1718 server.go:927] "Client rotation is on, will bootstrap in background" May 8 00:51:56.187733 kubelet[1718]: I0508 00:51:56.187689 1718 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:51:56.188086 kubelet[1718]: E0508 00:51:56.188063 1718 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.127:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.196629 kubelet[1718]: I0508 00:51:56.196604 1718 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:51:56.197805 kubelet[1718]: I0508 00:51:56.197760 1718 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:51:56.197977 kubelet[1718]: I0508 00:51:56.197808 1718 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 8 00:51:56.198087 kubelet[1718]: I0508 00:51:56.198074 1718 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:51:56.198087 kubelet[1718]: I0508 00:51:56.198085 1718 container_manager_linux.go:301] "Creating device plugin manager" May 8 00:51:56.198382 kubelet[1718]: I0508 00:51:56.198370 1718 state_mem.go:36] "Initialized new in-memory state store" May 8 00:51:56.199880 kubelet[1718]: I0508 00:51:56.199853 1718 kubelet.go:400] "Attempting to sync node with API server" May 8 00:51:56.199880 kubelet[1718]: I0508 00:51:56.199877 1718 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:51:56.200253 kubelet[1718]: I0508 00:51:56.200220 1718 kubelet.go:312] "Adding apiserver pod source" May 8 00:51:56.200399 kubelet[1718]: I0508 00:51:56.200375 1718 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:51:56.201791 kubelet[1718]: W0508 00:51:56.201741 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.201835 kubelet[1718]: E0508 00:51:56.201805 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.201892 kubelet[1718]: W0508 00:51:56.201865 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.201892 kubelet[1718]: I0508 00:51:56.201882 1718 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:51:56.201959 kubelet[1718]: E0508 00:51:56.201901 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.202374 kubelet[1718]: I0508 00:51:56.202361 1718 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:51:56.202508 kubelet[1718]: W0508 00:51:56.202494 1718 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:51:56.203407 kubelet[1718]: I0508 00:51:56.203376 1718 server.go:1264] "Started kubelet" May 8 00:51:56.203716 kubelet[1718]: I0508 00:51:56.203688 1718 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:51:56.205125 kubelet[1718]: I0508 00:51:56.205102 1718 server.go:455] "Adding debug handlers to kubelet server" May 8 00:51:56.207607 kubelet[1718]: I0508 00:51:56.207579 1718 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:51:56.207801 kubelet[1718]: I0508 00:51:56.207782 1718 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:51:56.208138 kubelet[1718]: I0508 00:51:56.208123 1718 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:51:56.210579 kubelet[1718]: E0508 00:51:56.210549 1718 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:51:56.207000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:56.207000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:51:56.207000 audit[1718]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a28d80 a1=40004434d0 a2=4000a28d50 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.207000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:51:56.207000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:56.207000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:51:56.207000 audit[1718]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007e32e0 a1=40004434e8 a2=4000a28e10 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.207000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:51:56.212370 kubelet[1718]: E0508 00:51:56.211899 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:51:56.212370 kubelet[1718]: I0508 00:51:56.212210 1718 volume_manager.go:291] "Starting Kubelet Volume Manager" May 8 00:51:56.212492 kubelet[1718]: I0508 00:51:56.212408 1718 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:51:56.212492 kubelet[1718]: I0508 00:51:56.212470 1718 reconciler.go:26] "Reconciler: start to sync state" May 8 00:51:56.212492 kubelet[1718]: I0508 00:51:56.212457 1718 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:51:56.212682 kubelet[1718]: I0508 00:51:56.212660 1718 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:51:56.212795 kubelet[1718]: W0508 00:51:56.212740 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.212795 kubelet[1718]: E0508 00:51:56.212780 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.213076 kubelet[1718]: E0508 00:51:56.213000 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="200ms" May 8 00:51:56.213472 kubelet[1718]: I0508 00:51:56.213451 1718 factory.go:221] Registration of the systemd container factory successfully May 8 00:51:56.213661 kubelet[1718]: I0508 00:51:56.213643 1718 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:51:56.213860 kubelet[1718]: E0508 00:51:56.213678 1718 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.127:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.127:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d670862b9a031 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:51:56.203352113 +0000 UTC m=+0.624516491,LastTimestamp:2025-05-08 00:51:56.203352113 +0000 UTC m=+0.624516491,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:51:56.214561 kubelet[1718]: I0508 00:51:56.214540 1718 factory.go:221] Registration of the containerd container factory successfully May 8 00:51:56.214000 audit[1730]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.214000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc5f6c370 a2=0 a3=1 items=0 ppid=1718 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:51:56.215000 audit[1731]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.215000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa9be200 a2=0 a3=1 items=0 ppid=1718 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:51:56.217000 audit[1733]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.217000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd0088550 a2=0 a3=1 items=0 ppid=1718 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:51:56.219000 audit[1735]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.219000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd2995ac0 a2=0 a3=1 items=0 ppid=1718 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:51:56.227809 kubelet[1718]: I0508 00:51:56.227779 1718 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:51:56.227809 kubelet[1718]: I0508 00:51:56.227802 1718 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:51:56.227900 kubelet[1718]: I0508 00:51:56.227821 1718 state_mem.go:36] "Initialized new in-memory state store" May 8 00:51:56.227000 audit[1745]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.227000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff6890d50 a2=0 a3=1 items=0 ppid=1718 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:51:56.229437 kubelet[1718]: I0508 00:51:56.229400 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:51:56.228000 audit[1746]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:51:56.228000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff6f36990 a2=0 a3=1 items=0 ppid=1718 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:51:56.229000 audit[1747]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.229000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4edbc20 a2=0 a3=1 items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:51:56.230746 kubelet[1718]: I0508 00:51:56.230731 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:51:56.230849 kubelet[1718]: I0508 00:51:56.230840 1718 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:51:56.230923 kubelet[1718]: I0508 00:51:56.230913 1718 kubelet.go:2337] "Starting kubelet main sync loop" May 8 00:51:56.231029 kubelet[1718]: E0508 00:51:56.231011 1718 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:51:56.230000 audit[1748]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.230000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe650dd90 a2=0 a3=1 items=0 ppid=1718 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:51:56.230000 audit[1749]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:51:56.230000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2d8a990 a2=0 a3=1 items=0 ppid=1718 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:51:56.231000 audit[1750]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:51:56.231000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7eda4b0 a2=0 a3=1 items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:51:56.232967 kubelet[1718]: W0508 00:51:56.232365 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.233112 kubelet[1718]: E0508 00:51:56.233100 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:56.233222 kubelet[1718]: I0508 00:51:56.233013 1718 policy_none.go:49] "None policy: Start" May 8 00:51:56.233771 kubelet[1718]: I0508 00:51:56.233758 1718 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:51:56.232000 audit[1751]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:51:56.232000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd79468f0 a2=0 a3=1 items=0 ppid=1718 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:51:56.234020 kubelet[1718]: I0508 00:51:56.234004 1718 state_mem.go:35] "Initializing new in-memory state store" May 8 00:51:56.233000 audit[1752]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:51:56.233000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce4663c0 a2=0 a3=1 items=0 ppid=1718 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:51:56.239939 systemd[1]: Created slice kubepods.slice. May 8 00:51:56.247642 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:51:56.250205 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:51:56.267304 kubelet[1718]: I0508 00:51:56.267273 1718 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:51:56.266000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:56.266000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:51:56.266000 audit[1718]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000950480 a1=4000e62108 a2=4000950450 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:56.267838 kubelet[1718]: I0508 00:51:56.267816 1718 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:51:56.268072 kubelet[1718]: I0508 00:51:56.268013 1718 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:51:56.268290 kubelet[1718]: I0508 00:51:56.268277 1718 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:51:56.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:51:56.269180 kubelet[1718]: E0508 00:51:56.269143 1718 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:51:56.314053 kubelet[1718]: I0508 00:51:56.314006 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:51:56.314402 kubelet[1718]: E0508 00:51:56.314368 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 8 00:51:56.331668 kubelet[1718]: I0508 00:51:56.331625 1718 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 8 00:51:56.332570 kubelet[1718]: I0508 00:51:56.332543 1718 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 8 00:51:56.333298 kubelet[1718]: I0508 00:51:56.333259 1718 topology_manager.go:215] "Topology Admit Handler" podUID="0c14ecdd215b55469a2275a252d925f6" podNamespace="kube-system" podName="kube-apiserver-localhost" May 8 00:51:56.338531 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 8 00:51:56.355696 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 8 00:51:56.370588 systemd[1]: Created slice kubepods-burstable-pod0c14ecdd215b55469a2275a252d925f6.slice. May 8 00:51:56.414579 kubelet[1718]: E0508 00:51:56.414462 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="400ms" May 8 00:51:56.513943 kubelet[1718]: I0508 00:51:56.513893 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:51:56.514061 kubelet[1718]: I0508 00:51:56.513940 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:51:56.514061 kubelet[1718]: I0508 00:51:56.513976 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:51:56.514061 kubelet[1718]: I0508 00:51:56.513994 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:51:56.514061 kubelet[1718]: I0508 00:51:56.514012 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:51:56.514175 kubelet[1718]: I0508 00:51:56.514103 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:51:56.514175 kubelet[1718]: I0508 00:51:56.514147 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:51:56.514175 kubelet[1718]: I0508 00:51:56.514164 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:51:56.514242 kubelet[1718]: I0508 00:51:56.514182 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 8 00:51:56.516181 kubelet[1718]: I0508 00:51:56.516140 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:51:56.516509 kubelet[1718]: E0508 00:51:56.516487 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 8 00:51:56.656461 kubelet[1718]: E0508 00:51:56.656421 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:56.657318 env[1219]: time="2025-05-08T00:51:56.657276312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 8 00:51:56.670020 kubelet[1718]: E0508 00:51:56.669922 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:56.670723 env[1219]: time="2025-05-08T00:51:56.670369747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 8 00:51:56.673149 kubelet[1718]: E0508 00:51:56.673130 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:56.673591 env[1219]: time="2025-05-08T00:51:56.673557273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0c14ecdd215b55469a2275a252d925f6,Namespace:kube-system,Attempt:0,}" May 8 00:51:56.814963 kubelet[1718]: E0508 00:51:56.814911 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="800ms" May 8 00:51:56.918290 kubelet[1718]: I0508 00:51:56.918257 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:51:56.919165 kubelet[1718]: E0508 00:51:56.919136 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 8 00:51:57.017105 kubelet[1718]: W0508 00:51:57.016989 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.017105 kubelet[1718]: E0508 00:51:57.017051 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.129944 kubelet[1718]: W0508 00:51:57.129891 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.129944 kubelet[1718]: E0508 00:51:57.129946 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.281268 kubelet[1718]: W0508 00:51:57.281153 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.281268 kubelet[1718]: E0508 00:51:57.281220 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.285945 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3482042755.mount: Deactivated successfully. May 8 00:51:57.291135 env[1219]: time="2025-05-08T00:51:57.291088197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.292621 env[1219]: time="2025-05-08T00:51:57.292596490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.293682 env[1219]: time="2025-05-08T00:51:57.293653830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.294926 env[1219]: time="2025-05-08T00:51:57.294893651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.296316 env[1219]: time="2025-05-08T00:51:57.296282934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.297024 env[1219]: time="2025-05-08T00:51:57.296999234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.298226 env[1219]: time="2025-05-08T00:51:57.298197342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.300652 env[1219]: time="2025-05-08T00:51:57.300624010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.305196 env[1219]: time="2025-05-08T00:51:57.305155902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.307880 env[1219]: time="2025-05-08T00:51:57.307823875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.308829 env[1219]: time="2025-05-08T00:51:57.308803077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.309836 env[1219]: time="2025-05-08T00:51:57.309809327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:51:57.340243 env[1219]: time="2025-05-08T00:51:57.340145688Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:51:57.340243 env[1219]: time="2025-05-08T00:51:57.340203470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:51:57.340243 env[1219]: time="2025-05-08T00:51:57.340221822Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:51:57.340494 env[1219]: time="2025-05-08T00:51:57.340442130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b557116e3425e5ff371f71c8a10a486bb4be62fcd55ae0b23a41ecb9bb01c4d pid=1776 runtime=io.containerd.runc.v2 May 8 00:51:57.342331 env[1219]: time="2025-05-08T00:51:57.342259927Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:51:57.342331 env[1219]: time="2025-05-08T00:51:57.342295390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:51:57.342331 env[1219]: time="2025-05-08T00:51:57.342305928Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:51:57.342649 env[1219]: time="2025-05-08T00:51:57.342597802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:51:57.342649 env[1219]: time="2025-05-08T00:51:57.342634025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:51:57.342719 env[1219]: time="2025-05-08T00:51:57.342644524Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:51:57.343543 env[1219]: time="2025-05-08T00:51:57.342620802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a26c3202b2df1a3e3d6f28b1f525f183d0b0dc18a96ed3a5aa8eb800530c40b9 pid=1778 runtime=io.containerd.runc.v2 May 8 00:51:57.343543 env[1219]: time="2025-05-08T00:51:57.342769544Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a336498dadae17d6f9c22a873c17cce97b5ffe8cc00720c3e0f6dd9940e0214b pid=1777 runtime=io.containerd.runc.v2 May 8 00:51:57.347267 kubelet[1718]: W0508 00:51:57.347227 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.347360 kubelet[1718]: E0508 00:51:57.347281 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 8 00:51:57.353856 systemd[1]: Started cri-containerd-1b557116e3425e5ff371f71c8a10a486bb4be62fcd55ae0b23a41ecb9bb01c4d.scope. May 8 00:51:57.356780 systemd[1]: Started cri-containerd-a336498dadae17d6f9c22a873c17cce97b5ffe8cc00720c3e0f6dd9940e0214b.scope. May 8 00:51:57.363208 systemd[1]: Started cri-containerd-a26c3202b2df1a3e3d6f28b1f525f183d0b0dc18a96ed3a5aa8eb800530c40b9.scope. May 8 00:51:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit: BPF prog-id=61 op=LOAD May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353537313136653334323565356666333731663731633861313061 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353537313136653334323565356666333731663731633861313061 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit: BPF prog-id=62 op=LOAD May 8 00:51:57.390000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353537313136653334323565356666333731663731633861313061 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit: BPF prog-id=63 op=LOAD May 8 00:51:57.390000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353537313136653334323565356666333731663731633861313061 May 8 00:51:57.390000 audit: BPF prog-id=63 op=UNLOAD May 8 00:51:57.390000 audit: BPF prog-id=62 op=UNLOAD May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.390000 audit: BPF prog-id=64 op=LOAD May 8 00:51:57.390000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353537313136653334323565356666333731663731633861313061 May 8 00:51:57.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit: BPF prog-id=65 op=LOAD May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1777 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133333634393864616461653137643666396332326138373363313763 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1777 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133333634393864616461653137643666396332326138373363313763 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit: BPF prog-id=66 op=LOAD May 8 00:51:57.392000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1777 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133333634393864616461653137643666396332326138373363313763 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit: BPF prog-id=67 op=LOAD May 8 00:51:57.392000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1777 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133333634393864616461653137643666396332326138373363313763 May 8 00:51:57.392000 audit: BPF prog-id=67 op=UNLOAD May 8 00:51:57.392000 audit: BPF prog-id=66 op=UNLOAD May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.392000 audit: BPF prog-id=68 op=LOAD May 8 00:51:57.392000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1777 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133333634393864616461653137643666396332326138373363313763 May 8 00:51:57.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.407000 audit: BPF prog-id=69 op=LOAD May 8 00:51:57.407000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.407000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1778 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366333323032623264663161336533643666323862316635323566 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1778 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366333323032623264663161336533643666323862316635323566 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.408000 audit: BPF prog-id=70 op=LOAD May 8 00:51:57.408000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1778 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366333323032623264663161336533643666323862316635323566 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit: BPF prog-id=71 op=LOAD May 8 00:51:57.409000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1778 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366333323032623264663161336533643666323862316635323566 May 8 00:51:57.409000 audit: BPF prog-id=71 op=UNLOAD May 8 00:51:57.409000 audit: BPF prog-id=70 op=UNLOAD May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.409000 audit: BPF prog-id=72 op=LOAD May 8 00:51:57.409000 audit[1818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1778 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366333323032623264663161336533643666323862316635323566 May 8 00:51:57.416693 env[1219]: time="2025-05-08T00:51:57.416653023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"1b557116e3425e5ff371f71c8a10a486bb4be62fcd55ae0b23a41ecb9bb01c4d\"" May 8 00:51:57.418122 kubelet[1718]: E0508 00:51:57.417877 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:57.424870 env[1219]: time="2025-05-08T00:51:57.424764852Z" level=info msg="CreateContainer within sandbox \"1b557116e3425e5ff371f71c8a10a486bb4be62fcd55ae0b23a41ecb9bb01c4d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:51:57.426214 env[1219]: time="2025-05-08T00:51:57.426173730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"a336498dadae17d6f9c22a873c17cce97b5ffe8cc00720c3e0f6dd9940e0214b\"" May 8 00:51:57.427049 kubelet[1718]: E0508 00:51:57.427026 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:57.429309 env[1219]: time="2025-05-08T00:51:57.429268854Z" level=info msg="CreateContainer within sandbox \"a336498dadae17d6f9c22a873c17cce97b5ffe8cc00720c3e0f6dd9940e0214b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:51:57.439106 env[1219]: time="2025-05-08T00:51:57.439064525Z" level=info msg="CreateContainer within sandbox \"1b557116e3425e5ff371f71c8a10a486bb4be62fcd55ae0b23a41ecb9bb01c4d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9e8ea4dd6d2ce6ddd911a3ddadd51dd6c12677fc880e3b894a3d4ee98fed87e1\"" May 8 00:51:57.441531 env[1219]: time="2025-05-08T00:51:57.441498166Z" level=info msg="StartContainer for \"9e8ea4dd6d2ce6ddd911a3ddadd51dd6c12677fc880e3b894a3d4ee98fed87e1\"" May 8 00:51:57.442792 env[1219]: time="2025-05-08T00:51:57.442763471Z" level=info msg="CreateContainer within sandbox \"a336498dadae17d6f9c22a873c17cce97b5ffe8cc00720c3e0f6dd9940e0214b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ca5938b052a39056ad99353b0d0a31875ca0277d7db5e23bd93f64c85b7ca4a0\"" May 8 00:51:57.443990 env[1219]: time="2025-05-08T00:51:57.443960176Z" level=info msg="StartContainer for \"ca5938b052a39056ad99353b0d0a31875ca0277d7db5e23bd93f64c85b7ca4a0\"" May 8 00:51:57.444498 env[1219]: time="2025-05-08T00:51:57.444458613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0c14ecdd215b55469a2275a252d925f6,Namespace:kube-system,Attempt:0,} returns sandbox id \"a26c3202b2df1a3e3d6f28b1f525f183d0b0dc18a96ed3a5aa8eb800530c40b9\"" May 8 00:51:57.445055 kubelet[1718]: E0508 00:51:57.445034 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:57.447032 env[1219]: time="2025-05-08T00:51:57.446998841Z" level=info msg="CreateContainer within sandbox \"a26c3202b2df1a3e3d6f28b1f525f183d0b0dc18a96ed3a5aa8eb800530c40b9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:51:57.458350 systemd[1]: Started cri-containerd-9e8ea4dd6d2ce6ddd911a3ddadd51dd6c12677fc880e3b894a3d4ee98fed87e1.scope. May 8 00:51:57.460616 env[1219]: time="2025-05-08T00:51:57.460572758Z" level=info msg="CreateContainer within sandbox \"a26c3202b2df1a3e3d6f28b1f525f183d0b0dc18a96ed3a5aa8eb800530c40b9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"654c48a3bdcf120f54427ed1a547fabc61e3f2fa3d3b3fd56ecf92553503c190\"" May 8 00:51:57.460797 systemd[1]: Started cri-containerd-ca5938b052a39056ad99353b0d0a31875ca0277d7db5e23bd93f64c85b7ca4a0.scope. May 8 00:51:57.461744 env[1219]: time="2025-05-08T00:51:57.461699139Z" level=info msg="StartContainer for \"654c48a3bdcf120f54427ed1a547fabc61e3f2fa3d3b3fd56ecf92553503c190\"" May 8 00:51:57.483892 systemd[1]: Started cri-containerd-654c48a3bdcf120f54427ed1a547fabc61e3f2fa3d3b3fd56ecf92553503c190.scope. May 8 00:51:57.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit: BPF prog-id=73 op=LOAD May 8 00:51:57.492000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.492000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1777 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361353933386230353261333930353661643939333533623064306133 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1777 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361353933386230353261333930353661643939333533623064306133 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.493000 audit: BPF prog-id=74 op=LOAD May 8 00:51:57.493000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1777 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361353933386230353261333930353661643939333533623064306133 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.497000 audit: BPF prog-id=75 op=LOAD May 8 00:51:57.497000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1777 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361353933386230353261333930353661643939333533623064306133 May 8 00:51:57.499000 audit: BPF prog-id=75 op=UNLOAD May 8 00:51:57.499000 audit: BPF prog-id=74 op=UNLOAD May 8 00:51:57.499000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.499000 audit: BPF prog-id=76 op=LOAD May 8 00:51:57.499000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1777 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361353933386230353261333930353661643939333533623064306133 May 8 00:51:57.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit: BPF prog-id=77 op=LOAD May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1778 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346334386133626463663132306635343432376564316135343766 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1778 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346334386133626463663132306635343432376564316135343766 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit: BPF prog-id=78 op=LOAD May 8 00:51:57.509000 audit[1925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1778 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346334386133626463663132306635343432376564316135343766 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.509000 audit: BPF prog-id=79 op=LOAD May 8 00:51:57.509000 audit[1925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1778 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346334386133626463663132306635343432376564316135343766 May 8 00:51:57.510000 audit: BPF prog-id=79 op=UNLOAD May 8 00:51:57.510000 audit: BPF prog-id=78 op=UNLOAD May 8 00:51:57.510000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.510000 audit: BPF prog-id=80 op=LOAD May 8 00:51:57.510000 audit[1925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1778 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346334386133626463663132306635343432376564316135343766 May 8 00:51:57.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.517000 audit: BPF prog-id=81 op=LOAD May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1776 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965386561346464366432636536646464393131613364646164643531 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1776 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965386561346464366432636536646464393131613364646164643531 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit: BPF prog-id=82 op=LOAD May 8 00:51:57.518000 audit[1885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1776 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965386561346464366432636536646464393131613364646164643531 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit: BPF prog-id=83 op=LOAD May 8 00:51:57.518000 audit[1885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1776 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965386561346464366432636536646464393131613364646164643531 May 8 00:51:57.518000 audit: BPF prog-id=83 op=UNLOAD May 8 00:51:57.518000 audit: BPF prog-id=82 op=UNLOAD May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:51:57.518000 audit: BPF prog-id=84 op=LOAD May 8 00:51:57.518000 audit[1885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1776 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:51:57.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965386561346464366432636536646464393131613364646164643531 May 8 00:51:57.548088 env[1219]: time="2025-05-08T00:51:57.547943962Z" level=info msg="StartContainer for \"654c48a3bdcf120f54427ed1a547fabc61e3f2fa3d3b3fd56ecf92553503c190\" returns successfully" May 8 00:51:57.548758 env[1219]: time="2025-05-08T00:51:57.547992768Z" level=info msg="StartContainer for \"ca5938b052a39056ad99353b0d0a31875ca0277d7db5e23bd93f64c85b7ca4a0\" returns successfully" May 8 00:51:57.583568 env[1219]: time="2025-05-08T00:51:57.582981112Z" level=info msg="StartContainer for \"9e8ea4dd6d2ce6ddd911a3ddadd51dd6c12677fc880e3b894a3d4ee98fed87e1\" returns successfully" May 8 00:51:57.620886 kubelet[1718]: E0508 00:51:57.617523 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="1.6s" May 8 00:51:57.720724 kubelet[1718]: I0508 00:51:57.720688 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:51:58.241149 kubelet[1718]: E0508 00:51:58.241115 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:58.241907 kubelet[1718]: E0508 00:51:58.241883 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:58.242222 kubelet[1718]: E0508 00:51:58.242202 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:59.244883 kubelet[1718]: E0508 00:51:59.244838 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:59.245401 kubelet[1718]: E0508 00:51:59.245365 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:59.245665 kubelet[1718]: E0508 00:51:59.245644 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:51:59.440113 kernel: kauditd_printk_skb: 561 callbacks suppressed May 8 00:51:59.440246 kernel: audit: type=1400 audit(1746665519.435:558): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.435000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.435000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40000a77c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:51:59.444503 kernel: audit: type=1300 audit(1746665519.435:558): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40000a77c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:51:59.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:51:59.447995 kernel: audit: type=1327 audit(1746665519.435:558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:51:59.447000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.452201 kernel: audit: type=1400 audit(1746665519.447:559): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.447000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b26030 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:51:59.447000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:51:59.456484 kernel: audit: type=1300 audit(1746665519.447:559): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b26030 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:51:59.460483 kernel: audit: type=1327 audit(1746665519.447:559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:51:59.575000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.575000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.581259 kernel: audit: type=1400 audit(1746665519.575:560): avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.581326 kernel: audit: type=1400 audit(1746665519.575:561): avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.575000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006c10690 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.585554 kernel: audit: type=1300 audit(1746665519.575:561): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006c10690 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.589228 kernel: audit: type=1327 audit(1746665519.575:561): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.579000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.579000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4006b1a4e0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.579000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.575000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4006910fc0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.585000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.585000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003da0560 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.591000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.591000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400482da60 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.591000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:51:59.591000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4006b1aed0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:51:59.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:51:59.674778 kubelet[1718]: E0508 00:51:59.674725 1718 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 8 00:51:59.702748 kubelet[1718]: I0508 00:51:59.702693 1718 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 8 00:51:59.719249 kubelet[1718]: E0508 00:51:59.719215 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:51:59.744530 kubelet[1718]: E0508 00:51:59.744428 1718 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.183d670862b9a031 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:51:56.203352113 +0000 UTC m=+0.624516491,LastTimestamp:2025-05-08 00:51:56.203352113 +0000 UTC m=+0.624516491,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:51:59.798507 kubelet[1718]: E0508 00:51:59.798361 1718 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.183d67086326fbfc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:51:56.210519036 +0000 UTC m=+0.631683414,LastTimestamp:2025-05-08 00:51:56.210519036 +0000 UTC m=+0.631683414,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:52:00.201986 kubelet[1718]: I0508 00:52:00.201945 1718 apiserver.go:52] "Watching apiserver" May 8 00:52:00.213426 kubelet[1718]: I0508 00:52:00.213376 1718 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:52:00.252037 kubelet[1718]: E0508 00:52:00.252000 1718 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 8 00:52:00.252553 kubelet[1718]: E0508 00:52:00.252535 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:01.552785 systemd[1]: Reloading. May 8 00:52:01.617674 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2025-05-08T00:52:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:52:01.618007 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2025-05-08T00:52:01Z" level=info msg="torcx already run" May 8 00:52:01.676227 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:52:01.676495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:52:01.692219 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:52:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.752000 audit: BPF prog-id=85 op=LOAD May 8 00:52:01.752000 audit: BPF prog-id=61 op=UNLOAD May 8 00:52:01.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.754000 audit: BPF prog-id=86 op=LOAD May 8 00:52:01.754000 audit: BPF prog-id=73 op=UNLOAD May 8 00:52:01.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit: BPF prog-id=87 op=LOAD May 8 00:52:01.756000 audit: BPF prog-id=46 op=UNLOAD May 8 00:52:01.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit: BPF prog-id=88 op=LOAD May 8 00:52:01.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.757000 audit: BPF prog-id=89 op=LOAD May 8 00:52:01.757000 audit: BPF prog-id=47 op=UNLOAD May 8 00:52:01.757000 audit: BPF prog-id=48 op=UNLOAD May 8 00:52:01.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit: BPF prog-id=90 op=LOAD May 8 00:52:01.760000 audit: BPF prog-id=49 op=UNLOAD May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit: BPF prog-id=91 op=LOAD May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit: BPF prog-id=92 op=LOAD May 8 00:52:01.761000 audit: BPF prog-id=50 op=UNLOAD May 8 00:52:01.761000 audit: BPF prog-id=51 op=UNLOAD May 8 00:52:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit: BPF prog-id=93 op=LOAD May 8 00:52:01.762000 audit: BPF prog-id=77 op=UNLOAD May 8 00:52:01.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit: BPF prog-id=94 op=LOAD May 8 00:52:01.763000 audit: BPF prog-id=52 op=UNLOAD May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.763000 audit: BPF prog-id=95 op=LOAD May 8 00:52:01.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.764000 audit: BPF prog-id=96 op=LOAD May 8 00:52:01.764000 audit: BPF prog-id=53 op=UNLOAD May 8 00:52:01.764000 audit: BPF prog-id=54 op=UNLOAD May 8 00:52:01.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.765000 audit: BPF prog-id=97 op=LOAD May 8 00:52:01.766000 audit: BPF prog-id=55 op=UNLOAD May 8 00:52:01.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.766000 audit: BPF prog-id=98 op=LOAD May 8 00:52:01.766000 audit: BPF prog-id=65 op=UNLOAD May 8 00:52:01.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.767000 audit: BPF prog-id=99 op=LOAD May 8 00:52:01.767000 audit: BPF prog-id=81 op=UNLOAD May 8 00:52:01.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.768000 audit: BPF prog-id=100 op=LOAD May 8 00:52:01.768000 audit: BPF prog-id=69 op=UNLOAD May 8 00:52:01.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.770000 audit: BPF prog-id=101 op=LOAD May 8 00:52:01.770000 audit: BPF prog-id=56 op=UNLOAD May 8 00:52:01.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit: BPF prog-id=102 op=LOAD May 8 00:52:01.772000 audit: BPF prog-id=57 op=UNLOAD May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit: BPF prog-id=103 op=LOAD May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit: BPF prog-id=104 op=LOAD May 8 00:52:01.772000 audit: BPF prog-id=58 op=UNLOAD May 8 00:52:01.772000 audit: BPF prog-id=59 op=UNLOAD May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.772000 audit: BPF prog-id=105 op=LOAD May 8 00:52:01.772000 audit: BPF prog-id=60 op=UNLOAD May 8 00:52:01.784082 systemd[1]: Stopping kubelet.service... May 8 00:52:01.808647 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:52:01.808834 systemd[1]: Stopped kubelet.service. May 8 00:52:01.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:01.808888 systemd[1]: kubelet.service: Consumed 1.013s CPU time. May 8 00:52:01.810364 systemd[1]: Starting kubelet.service... May 8 00:52:01.895659 systemd[1]: Started kubelet.service. May 8 00:52:01.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:01.941105 kubelet[2057]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:52:01.941105 kubelet[2057]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:52:01.941105 kubelet[2057]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:52:01.941483 kubelet[2057]: I0508 00:52:01.941137 2057 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:52:01.945558 kubelet[2057]: I0508 00:52:01.945521 2057 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 8 00:52:01.945558 kubelet[2057]: I0508 00:52:01.945543 2057 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:52:01.945735 kubelet[2057]: I0508 00:52:01.945704 2057 server.go:927] "Client rotation is on, will bootstrap in background" May 8 00:52:01.949147 kubelet[2057]: I0508 00:52:01.949102 2057 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:52:01.950837 kubelet[2057]: I0508 00:52:01.950465 2057 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:52:01.970465 kubelet[2057]: I0508 00:52:01.969685 2057 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:52:01.970465 kubelet[2057]: I0508 00:52:01.969895 2057 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:52:01.970465 kubelet[2057]: I0508 00:52:01.969920 2057 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 8 00:52:01.970465 kubelet[2057]: I0508 00:52:01.970080 2057 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970089 2057 container_manager_linux.go:301] "Creating device plugin manager" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970121 2057 state_mem.go:36] "Initialized new in-memory state store" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970201 2057 kubelet.go:400] "Attempting to sync node with API server" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970213 2057 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970240 2057 kubelet.go:312] "Adding apiserver pod source" May 8 00:52:01.970769 kubelet[2057]: I0508 00:52:01.970254 2057 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:52:01.979000 audit[2057]: AVC avc: denied { mac_admin } for pid=2057 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.979000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:01.979000 audit[2057]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000871cb0 a1=4000d3e318 a2=4000871c80 a3=25 items=0 ppid=1 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:01.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:01.979000 audit[2057]: AVC avc: denied { mac_admin } for pid=2057 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:01.979000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:01.979000 audit[2057]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cc87c0 a1=4000d3e330 a2=4000871d40 a3=25 items=0 ppid=1 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:01.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.971682 2057 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.976704 2057 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.977615 2057 server.go:1264] "Started kubelet" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.977882 2057 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.978854 2057 server.go:455] "Adding debug handlers to kubelet server" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.980908 2057 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.980953 2057 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.980982 2057 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.981536 2057 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:52:01.981976 kubelet[2057]: I0508 00:52:01.981739 2057 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:52:01.985551 kubelet[2057]: I0508 00:52:01.985524 2057 volume_manager.go:291] "Starting Kubelet Volume Manager" May 8 00:52:01.986103 kubelet[2057]: I0508 00:52:01.986035 2057 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:52:01.986219 kubelet[2057]: I0508 00:52:01.986198 2057 reconciler.go:26] "Reconciler: start to sync state" May 8 00:52:01.994443 kubelet[2057]: I0508 00:52:01.988026 2057 factory.go:221] Registration of the systemd container factory successfully May 8 00:52:01.994443 kubelet[2057]: I0508 00:52:01.988150 2057 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:52:01.994443 kubelet[2057]: I0508 00:52:01.990548 2057 factory.go:221] Registration of the containerd container factory successfully May 8 00:52:02.016784 kubelet[2057]: I0508 00:52:02.016729 2057 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:52:02.018635 kubelet[2057]: I0508 00:52:02.018587 2057 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:52:02.018719 kubelet[2057]: I0508 00:52:02.018648 2057 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:52:02.018719 kubelet[2057]: I0508 00:52:02.018666 2057 kubelet.go:2337] "Starting kubelet main sync loop" May 8 00:52:02.018788 kubelet[2057]: E0508 00:52:02.018728 2057 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:52:02.031740 kubelet[2057]: I0508 00:52:02.031717 2057 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:52:02.031740 kubelet[2057]: I0508 00:52:02.031734 2057 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:52:02.031869 kubelet[2057]: I0508 00:52:02.031754 2057 state_mem.go:36] "Initialized new in-memory state store" May 8 00:52:02.031913 kubelet[2057]: I0508 00:52:02.031906 2057 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:52:02.031940 kubelet[2057]: I0508 00:52:02.031916 2057 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:52:02.031940 kubelet[2057]: I0508 00:52:02.031933 2057 policy_none.go:49] "None policy: Start" May 8 00:52:02.032574 kubelet[2057]: I0508 00:52:02.032543 2057 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:52:02.032693 kubelet[2057]: I0508 00:52:02.032682 2057 state_mem.go:35] "Initializing new in-memory state store" May 8 00:52:02.032886 kubelet[2057]: I0508 00:52:02.032871 2057 state_mem.go:75] "Updated machine memory state" May 8 00:52:02.036685 kubelet[2057]: I0508 00:52:02.036658 2057 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:52:02.035000 audit[2057]: AVC avc: denied { mac_admin } for pid=2057 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:02.035000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:52:02.035000 audit[2057]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d5fb90 a1=4000d355c0 a2=4000d5fb60 a3=25 items=0 ppid=1 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:02.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:52:02.036958 kubelet[2057]: I0508 00:52:02.036740 2057 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:52:02.036958 kubelet[2057]: I0508 00:52:02.036884 2057 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:52:02.037009 kubelet[2057]: I0508 00:52:02.036989 2057 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:52:02.089236 kubelet[2057]: I0508 00:52:02.089133 2057 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:52:02.100030 kubelet[2057]: I0508 00:52:02.100005 2057 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 8 00:52:02.100200 kubelet[2057]: I0508 00:52:02.100188 2057 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 8 00:52:02.119105 kubelet[2057]: I0508 00:52:02.119065 2057 topology_manager.go:215] "Topology Admit Handler" podUID="0c14ecdd215b55469a2275a252d925f6" podNamespace="kube-system" podName="kube-apiserver-localhost" May 8 00:52:02.119210 kubelet[2057]: I0508 00:52:02.119173 2057 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 8 00:52:02.119238 kubelet[2057]: I0508 00:52:02.119209 2057 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 8 00:52:02.186657 kubelet[2057]: I0508 00:52:02.186609 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:52:02.186657 kubelet[2057]: I0508 00:52:02.186651 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:52:02.186800 kubelet[2057]: I0508 00:52:02.186674 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:52:02.186800 kubelet[2057]: I0508 00:52:02.186690 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:52:02.186800 kubelet[2057]: I0508 00:52:02.186707 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:52:02.186800 kubelet[2057]: I0508 00:52:02.186721 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0c14ecdd215b55469a2275a252d925f6-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0c14ecdd215b55469a2275a252d925f6\") " pod="kube-system/kube-apiserver-localhost" May 8 00:52:02.186800 kubelet[2057]: I0508 00:52:02.186736 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:52:02.186930 kubelet[2057]: I0508 00:52:02.186750 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:52:02.186930 kubelet[2057]: I0508 00:52:02.186766 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 8 00:52:02.424933 kubelet[2057]: E0508 00:52:02.424902 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:02.426991 kubelet[2057]: E0508 00:52:02.426966 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:02.429811 kubelet[2057]: E0508 00:52:02.427464 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:02.971282 kubelet[2057]: I0508 00:52:02.971234 2057 apiserver.go:52] "Watching apiserver" May 8 00:52:02.987158 kubelet[2057]: I0508 00:52:02.987134 2057 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:52:03.027107 kubelet[2057]: E0508 00:52:03.027081 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:03.027493 kubelet[2057]: E0508 00:52:03.027462 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:03.033674 kubelet[2057]: E0508 00:52:03.033647 2057 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:52:03.034141 kubelet[2057]: E0508 00:52:03.034122 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:03.064934 kubelet[2057]: I0508 00:52:03.064861 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.064845246 podStartE2EDuration="1.064845246s" podCreationTimestamp="2025-05-08 00:52:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:03.059097384 +0000 UTC m=+1.159854604" watchObservedRunningTime="2025-05-08 00:52:03.064845246 +0000 UTC m=+1.165602466" May 8 00:52:03.071945 kubelet[2057]: I0508 00:52:03.071898 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.071889452 podStartE2EDuration="1.071889452s" podCreationTimestamp="2025-05-08 00:52:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:03.071769197 +0000 UTC m=+1.172526417" watchObservedRunningTime="2025-05-08 00:52:03.071889452 +0000 UTC m=+1.172646672" May 8 00:52:03.072046 kubelet[2057]: I0508 00:52:03.071970 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.071965792 podStartE2EDuration="1.071965792s" podCreationTimestamp="2025-05-08 00:52:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:03.065199365 +0000 UTC m=+1.165956585" watchObservedRunningTime="2025-05-08 00:52:03.071965792 +0000 UTC m=+1.172722972" May 8 00:52:04.028119 kubelet[2057]: E0508 00:52:04.028075 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:05.029671 kubelet[2057]: E0508 00:52:05.029633 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:05.475785 kubelet[2057]: E0508 00:52:05.475747 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:06.718178 sudo[1357]: pam_unix(sudo:session): session closed for user root May 8 00:52:06.716000 audit[1357]: USER_END pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:06.718942 kernel: kauditd_printk_skb: 272 callbacks suppressed May 8 00:52:06.719001 kernel: audit: type=1106 audit(1746665526.716:815): pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:06.716000 audit[1357]: CRED_DISP pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:06.722612 sshd[1354]: pam_unix(sshd:session): session closed for user core May 8 00:52:06.724526 kernel: audit: type=1104 audit(1746665526.716:816): pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:52:06.722000 audit[1354]: USER_END pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:06.725019 systemd[1]: sshd@6-10.0.0.127:22-10.0.0.1:36278.service: Deactivated successfully. May 8 00:52:06.725754 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:52:06.725913 systemd[1]: session-7.scope: Consumed 6.159s CPU time. May 8 00:52:06.726337 systemd-logind[1205]: Session 7 logged out. Waiting for processes to exit. May 8 00:52:06.727305 systemd-logind[1205]: Removed session 7. May 8 00:52:06.728160 kernel: audit: type=1106 audit(1746665526.722:817): pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:06.728221 kernel: audit: type=1104 audit(1746665526.722:818): pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:06.722000 audit[1354]: CRED_DISP pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:06.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:36278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:06.733476 kernel: audit: type=1131 audit(1746665526.723:819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:36278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:08.285840 kubelet[2057]: E0508 00:52:08.285799 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:09.040119 kubelet[2057]: E0508 00:52:09.040068 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:10.038026 kubelet[2057]: E0508 00:52:10.037994 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:10.056683 kubelet[2057]: E0508 00:52:10.056649 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:11.038998 kubelet[2057]: E0508 00:52:11.038966 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:14.878000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.878000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000970220 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.886867 kernel: audit: type=1400 audit(1746665534.878:820): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.886927 kernel: audit: type=1300 audit(1746665534.878:820): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000970220 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.886951 kernel: audit: type=1327 audit(1746665534.878:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.878000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.879000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.892984 kernel: audit: type=1400 audit(1746665534.879:821): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.893038 kernel: audit: type=1300 audit(1746665534.879:821): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000970260 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.879000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000970260 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.899980 kernel: audit: type=1327 audit(1746665534.879:821): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.900028 kernel: audit: type=1400 audit(1746665534.879:822): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.879000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.879000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d0b8e0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.906544 kernel: audit: type=1300 audit(1746665534.879:822): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d0b8e0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.906590 kernel: audit: type=1327 audit(1746665534.879:822): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:14.879000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.912448 kernel: audit: type=1400 audit(1746665534.879:823): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:14.879000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d0b920 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:14.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:15.483226 kubelet[2057]: E0508 00:52:15.483181 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:17.002992 update_engine[1208]: I0508 00:52:17.002947 1208 update_attempter.cc:509] Updating boot flags... May 8 00:52:17.179000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:52:17.179000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006a4c00 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:17.179000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:18.249334 kubelet[2057]: I0508 00:52:18.249287 2057 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:52:18.249907 env[1219]: time="2025-05-08T00:52:18.249869395Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:52:18.250318 kubelet[2057]: I0508 00:52:18.250283 2057 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:52:19.045910 kubelet[2057]: I0508 00:52:19.045869 2057 topology_manager.go:215] "Topology Admit Handler" podUID="44dcae55-dc0e-458a-b78e-f9eaa1c6fefd" podNamespace="kube-system" podName="kube-proxy-sj5hg" May 8 00:52:19.051500 systemd[1]: Created slice kubepods-besteffort-pod44dcae55_dc0e_458a_b78e_f9eaa1c6fefd.slice. May 8 00:52:19.102673 kubelet[2057]: I0508 00:52:19.102625 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/44dcae55-dc0e-458a-b78e-f9eaa1c6fefd-xtables-lock\") pod \"kube-proxy-sj5hg\" (UID: \"44dcae55-dc0e-458a-b78e-f9eaa1c6fefd\") " pod="kube-system/kube-proxy-sj5hg" May 8 00:52:19.102673 kubelet[2057]: I0508 00:52:19.102671 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/44dcae55-dc0e-458a-b78e-f9eaa1c6fefd-lib-modules\") pod \"kube-proxy-sj5hg\" (UID: \"44dcae55-dc0e-458a-b78e-f9eaa1c6fefd\") " pod="kube-system/kube-proxy-sj5hg" May 8 00:52:19.102856 kubelet[2057]: I0508 00:52:19.102691 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/44dcae55-dc0e-458a-b78e-f9eaa1c6fefd-kube-proxy\") pod \"kube-proxy-sj5hg\" (UID: \"44dcae55-dc0e-458a-b78e-f9eaa1c6fefd\") " pod="kube-system/kube-proxy-sj5hg" May 8 00:52:19.102856 kubelet[2057]: I0508 00:52:19.102714 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mz5jk\" (UniqueName: \"kubernetes.io/projected/44dcae55-dc0e-458a-b78e-f9eaa1c6fefd-kube-api-access-mz5jk\") pod \"kube-proxy-sj5hg\" (UID: \"44dcae55-dc0e-458a-b78e-f9eaa1c6fefd\") " pod="kube-system/kube-proxy-sj5hg" May 8 00:52:19.264854 kubelet[2057]: I0508 00:52:19.264802 2057 topology_manager.go:215] "Topology Admit Handler" podUID="315b330c-cdca-4453-b088-5a8067ebfab7" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-tlfnt" May 8 00:52:19.270600 systemd[1]: Created slice kubepods-besteffort-pod315b330c_cdca_4453_b088_5a8067ebfab7.slice. May 8 00:52:19.304351 kubelet[2057]: I0508 00:52:19.304245 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/315b330c-cdca-4453-b088-5a8067ebfab7-var-lib-calico\") pod \"tigera-operator-797db67f8-tlfnt\" (UID: \"315b330c-cdca-4453-b088-5a8067ebfab7\") " pod="tigera-operator/tigera-operator-797db67f8-tlfnt" May 8 00:52:19.304554 kubelet[2057]: I0508 00:52:19.304530 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2v6k\" (UniqueName: \"kubernetes.io/projected/315b330c-cdca-4453-b088-5a8067ebfab7-kube-api-access-k2v6k\") pod \"tigera-operator-797db67f8-tlfnt\" (UID: \"315b330c-cdca-4453-b088-5a8067ebfab7\") " pod="tigera-operator/tigera-operator-797db67f8-tlfnt" May 8 00:52:19.365563 kubelet[2057]: E0508 00:52:19.365525 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:19.366148 env[1219]: time="2025-05-08T00:52:19.366097978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sj5hg,Uid:44dcae55-dc0e-458a-b78e-f9eaa1c6fefd,Namespace:kube-system,Attempt:0,}" May 8 00:52:19.381378 env[1219]: time="2025-05-08T00:52:19.381299368Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:19.381378 env[1219]: time="2025-05-08T00:52:19.381341749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:19.381378 env[1219]: time="2025-05-08T00:52:19.381352675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:19.381777 env[1219]: time="2025-05-08T00:52:19.381731664Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392 pid=2168 runtime=io.containerd.runc.v2 May 8 00:52:19.400829 systemd[1]: Started cri-containerd-29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392.scope. May 8 00:52:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit: BPF prog-id=106 op=LOAD May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239663530646564623833316239323834613265366238376238633038 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239663530646564623833316239323834613265366238376238633038 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit: BPF prog-id=107 op=LOAD May 8 00:52:19.419000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239663530646564623833316239323834613265366238376238633038 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit: BPF prog-id=108 op=LOAD May 8 00:52:19.419000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239663530646564623833316239323834613265366238376238633038 May 8 00:52:19.419000 audit: BPF prog-id=108 op=UNLOAD May 8 00:52:19.419000 audit: BPF prog-id=107 op=UNLOAD May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.419000 audit: BPF prog-id=109 op=LOAD May 8 00:52:19.419000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239663530646564623833316239323834613265366238376238633038 May 8 00:52:19.431021 env[1219]: time="2025-05-08T00:52:19.430797402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sj5hg,Uid:44dcae55-dc0e-458a-b78e-f9eaa1c6fefd,Namespace:kube-system,Attempt:0,} returns sandbox id \"29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392\"" May 8 00:52:19.431469 kubelet[2057]: E0508 00:52:19.431444 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:19.434324 env[1219]: time="2025-05-08T00:52:19.434293948Z" level=info msg="CreateContainer within sandbox \"29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:52:19.447524 env[1219]: time="2025-05-08T00:52:19.447480611Z" level=info msg="CreateContainer within sandbox \"29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9fc887545ef4d4af25435c7f80bdfc871d820c679c098c61ec0de57c738a99e1\"" May 8 00:52:19.448021 env[1219]: time="2025-05-08T00:52:19.447990426Z" level=info msg="StartContainer for \"9fc887545ef4d4af25435c7f80bdfc871d820c679c098c61ec0de57c738a99e1\"" May 8 00:52:19.465156 systemd[1]: Started cri-containerd-9fc887545ef4d4af25435c7f80bdfc871d820c679c098c61ec0de57c738a99e1.scope. May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633838373534356566346434616632353433356337663830626466 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit: BPF prog-id=110 op=LOAD May 8 00:52:19.486000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633838373534356566346434616632353433356337663830626466 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.486000 audit: BPF prog-id=111 op=LOAD May 8 00:52:19.486000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633838373534356566346434616632353433356337663830626466 May 8 00:52:19.486000 audit: BPF prog-id=111 op=UNLOAD May 8 00:52:19.487000 audit: BPF prog-id=110 op=UNLOAD May 8 00:52:19.487000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.487000 audit: BPF prog-id=112 op=LOAD May 8 00:52:19.487000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2168 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633838373534356566346434616632353433356337663830626466 May 8 00:52:19.507360 env[1219]: time="2025-05-08T00:52:19.507311484Z" level=info msg="StartContainer for \"9fc887545ef4d4af25435c7f80bdfc871d820c679c098c61ec0de57c738a99e1\" returns successfully" May 8 00:52:19.575666 env[1219]: time="2025-05-08T00:52:19.573031257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-tlfnt,Uid:315b330c-cdca-4453-b088-5a8067ebfab7,Namespace:tigera-operator,Attempt:0,}" May 8 00:52:19.588912 env[1219]: time="2025-05-08T00:52:19.586193869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:19.588912 env[1219]: time="2025-05-08T00:52:19.586231327Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:19.588912 env[1219]: time="2025-05-08T00:52:19.586259461Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:19.588912 env[1219]: time="2025-05-08T00:52:19.586430267Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f872c3b76df281495c912e284b8977adf31fcca8480b5b8671c8030589127c7 pid=2247 runtime=io.containerd.runc.v2 May 8 00:52:19.600560 systemd[1]: Started cri-containerd-4f872c3b76df281495c912e284b8977adf31fcca8480b5b8671c8030589127c7.scope. May 8 00:52:19.626000 audit[2291]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.626000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd461f9f0 a2=0 a3=1 items=0 ppid=2220 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:52:19.631000 audit[2292]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.631000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff52b0a20 a2=0 a3=1 items=0 ppid=2220 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:52:19.635000 audit[2293]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.635000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed6c5370 a2=0 a3=1 items=0 ppid=2220 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:52:19.635000 audit[2298]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.635000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea053f80 a2=0 a3=1 items=0 ppid=2220 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:52:19.636000 audit[2299]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.636000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5a897f0 a2=0 a3=1 items=0 ppid=2220 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:52:19.639000 audit[2300]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.639000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9a2f7d0 a2=0 a3=1 items=0 ppid=2220 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:52:19.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit: BPF prog-id=113 op=LOAD May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2247 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466383732633362373664663238313439356339313265323834623839 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2247 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466383732633362373664663238313439356339313265323834623839 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit: BPF prog-id=114 op=LOAD May 8 00:52:19.702000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2247 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466383732633362373664663238313439356339313265323834623839 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit: BPF prog-id=115 op=LOAD May 8 00:52:19.702000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2247 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466383732633362373664663238313439356339313265323834623839 May 8 00:52:19.702000 audit: BPF prog-id=115 op=UNLOAD May 8 00:52:19.702000 audit: BPF prog-id=114 op=UNLOAD May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:19.702000 audit: BPF prog-id=116 op=LOAD May 8 00:52:19.702000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2247 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466383732633362373664663238313439356339313265323834623839 May 8 00:52:19.724011 env[1219]: time="2025-05-08T00:52:19.723968017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-tlfnt,Uid:315b330c-cdca-4453-b088-5a8067ebfab7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4f872c3b76df281495c912e284b8977adf31fcca8480b5b8671c8030589127c7\"" May 8 00:52:19.725836 env[1219]: time="2025-05-08T00:52:19.725588826Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:52:19.729000 audit[2308]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.729000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe196af20 a2=0 a3=1 items=0 ppid=2220 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:52:19.734000 audit[2310]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.734000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc9a72a70 a2=0 a3=1 items=0 ppid=2220 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:52:19.737000 audit[2313]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.737000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc6900c50 a2=0 a3=1 items=0 ppid=2220 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:52:19.738000 audit[2314]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.738000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0ed45c0 a2=0 a3=1 items=0 ppid=2220 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:52:19.740000 audit[2316]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.740000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3d6bd90 a2=0 a3=1 items=0 ppid=2220 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:52:19.741000 audit[2317]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.741000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0573900 a2=0 a3=1 items=0 ppid=2220 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:52:19.743000 audit[2319]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.743000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc3f9e3a0 a2=0 a3=1 items=0 ppid=2220 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:52:19.746000 audit[2322]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.746000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcee3d160 a2=0 a3=1 items=0 ppid=2220 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:52:19.747000 audit[2323]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.747000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc224ea80 a2=0 a3=1 items=0 ppid=2220 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:52:19.749000 audit[2325]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.749000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd196ad20 a2=0 a3=1 items=0 ppid=2220 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:52:19.750000 audit[2326]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.750000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffece30530 a2=0 a3=1 items=0 ppid=2220 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:52:19.753000 audit[2328]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.753000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffb4c3140 a2=0 a3=1 items=0 ppid=2220 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:19.756000 audit[2331]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.756000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff077a280 a2=0 a3=1 items=0 ppid=2220 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:19.759000 audit[2334]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.759000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcd7444f0 a2=0 a3=1 items=0 ppid=2220 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:52:19.760000 audit[2335]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.760000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd193d6e0 a2=0 a3=1 items=0 ppid=2220 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:52:19.762000 audit[2337]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.762000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff6c002f0 a2=0 a3=1 items=0 ppid=2220 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:19.766000 audit[2340]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.766000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe252dfc0 a2=0 a3=1 items=0 ppid=2220 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:19.767000 audit[2341]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.767000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca75d2c0 a2=0 a3=1 items=0 ppid=2220 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:52:19.769000 audit[2343]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:52:19.769000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe02798f0 a2=0 a3=1 items=0 ppid=2220 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:52:19.789000 audit[2349]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:19.789000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdf5c5ac0 a2=0 a3=1 items=0 ppid=2220 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:19.799000 audit[2349]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:19.799000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffdf5c5ac0 a2=0 a3=1 items=0 ppid=2220 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:19.802000 audit[2353]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.802000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc53c6fe0 a2=0 a3=1 items=0 ppid=2220 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:52:19.804000 audit[2355]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.804000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff4c22c50 a2=0 a3=1 items=0 ppid=2220 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:52:19.807000 audit[2358]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.807000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffad11950 a2=0 a3=1 items=0 ppid=2220 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:52:19.808000 audit[2359]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.808000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca6d82f0 a2=0 a3=1 items=0 ppid=2220 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:52:19.810000 audit[2361]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.810000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffcfcef10 a2=0 a3=1 items=0 ppid=2220 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:52:19.811000 audit[2362]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.811000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe56a8240 a2=0 a3=1 items=0 ppid=2220 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:52:19.814000 audit[2364]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.814000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffce6b7c50 a2=0 a3=1 items=0 ppid=2220 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:52:19.817000 audit[2367]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.817000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd5cc39f0 a2=0 a3=1 items=0 ppid=2220 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:52:19.818000 audit[2368]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.818000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea2eb340 a2=0 a3=1 items=0 ppid=2220 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:52:19.820000 audit[2370]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.820000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd0ca20e0 a2=0 a3=1 items=0 ppid=2220 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:52:19.821000 audit[2371]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.821000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce145050 a2=0 a3=1 items=0 ppid=2220 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:52:19.823000 audit[2373]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.823000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd55bac60 a2=0 a3=1 items=0 ppid=2220 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:52:19.826000 audit[2376]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.826000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd652a6d0 a2=0 a3=1 items=0 ppid=2220 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:52:19.829000 audit[2379]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.829000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed0ef400 a2=0 a3=1 items=0 ppid=2220 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:52:19.830000 audit[2380]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.830000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd65e8e00 a2=0 a3=1 items=0 ppid=2220 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:52:19.833000 audit[2382]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.833000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff0da7c50 a2=0 a3=1 items=0 ppid=2220 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:19.836000 audit[2385]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.836000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffda244150 a2=0 a3=1 items=0 ppid=2220 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:52:19.837000 audit[2386]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.837000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde988960 a2=0 a3=1 items=0 ppid=2220 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:52:19.839000 audit[2388]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.839000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff86efc70 a2=0 a3=1 items=0 ppid=2220 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:52:19.840000 audit[2389]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.840000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe51a2850 a2=0 a3=1 items=0 ppid=2220 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:52:19.842000 audit[2391]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.842000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd1034e60 a2=0 a3=1 items=0 ppid=2220 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:19.845000 audit[2394]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:52:19.845000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff5716380 a2=0 a3=1 items=0 ppid=2220 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:52:19.847000 audit[2396]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:52:19.847000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffd89aac30 a2=0 a3=1 items=0 ppid=2220 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.847000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:19.848000 audit[2396]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:52:19.848000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd89aac30 a2=0 a3=1 items=0 ppid=2220 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:19.848000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:20.054119 kubelet[2057]: E0508 00:52:20.054091 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:20.062882 kubelet[2057]: I0508 00:52:20.062826 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sj5hg" podStartSLOduration=1.062810504 podStartE2EDuration="1.062810504s" podCreationTimestamp="2025-05-08 00:52:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:20.062491912 +0000 UTC m=+18.163249172" watchObservedRunningTime="2025-05-08 00:52:20.062810504 +0000 UTC m=+18.163567724" May 8 00:52:20.218008 systemd[1]: run-containerd-runc-k8s.io-29f50dedb831b9284a2e6b87b8c088f6a4819fd8e064ac54835d6dad0a8f5392-runc.A0Hrv6.mount: Deactivated successfully. May 8 00:52:21.759304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4105025059.mount: Deactivated successfully. May 8 00:52:22.368462 env[1219]: time="2025-05-08T00:52:22.368413140Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:22.369791 env[1219]: time="2025-05-08T00:52:22.369767567Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:22.371313 env[1219]: time="2025-05-08T00:52:22.371278981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:22.372732 env[1219]: time="2025-05-08T00:52:22.372708841Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:22.373924 env[1219]: time="2025-05-08T00:52:22.373896635Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 8 00:52:22.377082 env[1219]: time="2025-05-08T00:52:22.377050601Z" level=info msg="CreateContainer within sandbox \"4f872c3b76df281495c912e284b8977adf31fcca8480b5b8671c8030589127c7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:52:22.387453 env[1219]: time="2025-05-08T00:52:22.387416572Z" level=info msg="CreateContainer within sandbox \"4f872c3b76df281495c912e284b8977adf31fcca8480b5b8671c8030589127c7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"961e307efa29fc70b464f47b867d08b3c7a2b92aa70de0a26f6c3958e5db7bf4\"" May 8 00:52:22.389039 env[1219]: time="2025-05-08T00:52:22.388148289Z" level=info msg="StartContainer for \"961e307efa29fc70b464f47b867d08b3c7a2b92aa70de0a26f6c3958e5db7bf4\"" May 8 00:52:22.403500 systemd[1]: Started cri-containerd-961e307efa29fc70b464f47b867d08b3c7a2b92aa70de0a26f6c3958e5db7bf4.scope. May 8 00:52:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.431549 kernel: kauditd_printk_skb: 315 callbacks suppressed May 8 00:52:22.431638 kernel: audit: type=1400 audit(1746665542.426:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.431701 kernel: audit: type=1400 audit(1746665542.426:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.436520 kernel: audit: type=1400 audit(1746665542.426:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.436586 kernel: audit: type=1400 audit(1746665542.426:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.441099 kernel: audit: type=1400 audit(1746665542.426:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.441149 kernel: audit: type=1400 audit(1746665542.426:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.445783 kernel: audit: type=1400 audit(1746665542.426:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.448655 kernel: audit: type=1400 audit(1746665542.426:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.448754 kernel: audit: type=1400 audit(1746665542.426:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.451967 kernel: audit: type=1400 audit(1746665542.426:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.426000 audit: BPF prog-id=117 op=LOAD May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2247 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316533303765666132396663373062343634663437623836376430 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2247 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316533303765666132396663373062343634663437623836376430 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit: BPF prog-id=118 op=LOAD May 8 00:52:22.427000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2247 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316533303765666132396663373062343634663437623836376430 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.427000 audit: BPF prog-id=119 op=LOAD May 8 00:52:22.427000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2247 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316533303765666132396663373062343634663437623836376430 May 8 00:52:22.430000 audit: BPF prog-id=119 op=UNLOAD May 8 00:52:22.430000 audit: BPF prog-id=118 op=UNLOAD May 8 00:52:22.430000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:22.430000 audit: BPF prog-id=120 op=LOAD May 8 00:52:22.430000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2247 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:22.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316533303765666132396663373062343634663437623836376430 May 8 00:52:22.461129 env[1219]: time="2025-05-08T00:52:22.461079122Z" level=info msg="StartContainer for \"961e307efa29fc70b464f47b867d08b3c7a2b92aa70de0a26f6c3958e5db7bf4\" returns successfully" May 8 00:52:25.631000 audit[2437]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:25.631000 audit[2437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe836bb50 a2=0 a3=1 items=0 ppid=2220 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:25.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:25.636000 audit[2437]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:25.636000 audit[2437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe836bb50 a2=0 a3=1 items=0 ppid=2220 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:25.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:25.644000 audit[2439]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:25.644000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc323c7f0 a2=0 a3=1 items=0 ppid=2220 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:25.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:25.650000 audit[2439]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:25.650000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc323c7f0 a2=0 a3=1 items=0 ppid=2220 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:25.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:26.582007 kubelet[2057]: I0508 00:52:26.581929 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-tlfnt" podStartSLOduration=4.932386754 podStartE2EDuration="7.581912284s" podCreationTimestamp="2025-05-08 00:52:19 +0000 UTC" firstStartedPulling="2025-05-08 00:52:19.725082493 +0000 UTC m=+17.825839713" lastFinishedPulling="2025-05-08 00:52:22.374608023 +0000 UTC m=+20.475365243" observedRunningTime="2025-05-08 00:52:23.071203943 +0000 UTC m=+21.171961163" watchObservedRunningTime="2025-05-08 00:52:26.581912284 +0000 UTC m=+24.682669504" May 8 00:52:26.582449 kubelet[2057]: I0508 00:52:26.582073 2057 topology_manager.go:215] "Topology Admit Handler" podUID="d93e54d2-c75f-4207-87a1-dac5d37670d1" podNamespace="calico-system" podName="calico-typha-5cd8f6d874-9fx7g" May 8 00:52:26.588138 systemd[1]: Created slice kubepods-besteffort-podd93e54d2_c75f_4207_87a1_dac5d37670d1.slice. May 8 00:52:26.608000 audit[2441]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:26.608000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffe2d999a0 a2=0 a3=1 items=0 ppid=2220 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:26.614000 audit[2441]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:26.614000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe2d999a0 a2=0 a3=1 items=0 ppid=2220 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:26.658327 kubelet[2057]: I0508 00:52:26.658281 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d93e54d2-c75f-4207-87a1-dac5d37670d1-typha-certs\") pod \"calico-typha-5cd8f6d874-9fx7g\" (UID: \"d93e54d2-c75f-4207-87a1-dac5d37670d1\") " pod="calico-system/calico-typha-5cd8f6d874-9fx7g" May 8 00:52:26.658566 kubelet[2057]: I0508 00:52:26.658549 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d93e54d2-c75f-4207-87a1-dac5d37670d1-tigera-ca-bundle\") pod \"calico-typha-5cd8f6d874-9fx7g\" (UID: \"d93e54d2-c75f-4207-87a1-dac5d37670d1\") " pod="calico-system/calico-typha-5cd8f6d874-9fx7g" May 8 00:52:26.658663 kubelet[2057]: I0508 00:52:26.658645 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mmb9\" (UniqueName: \"kubernetes.io/projected/d93e54d2-c75f-4207-87a1-dac5d37670d1-kube-api-access-5mmb9\") pod \"calico-typha-5cd8f6d874-9fx7g\" (UID: \"d93e54d2-c75f-4207-87a1-dac5d37670d1\") " pod="calico-system/calico-typha-5cd8f6d874-9fx7g" May 8 00:52:26.780963 kubelet[2057]: I0508 00:52:26.780922 2057 topology_manager.go:215] "Topology Admit Handler" podUID="f348512d-94c7-49c3-9474-3b1a353008ce" podNamespace="calico-system" podName="calico-node-bb4t4" May 8 00:52:26.785840 systemd[1]: Created slice kubepods-besteffort-podf348512d_94c7_49c3_9474_3b1a353008ce.slice. May 8 00:52:26.859832 kubelet[2057]: I0508 00:52:26.859716 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-var-run-calico\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860007 kubelet[2057]: I0508 00:52:26.859990 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-lib-modules\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860104 kubelet[2057]: I0508 00:52:26.860091 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-xtables-lock\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860203 kubelet[2057]: I0508 00:52:26.860189 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f348512d-94c7-49c3-9474-3b1a353008ce-tigera-ca-bundle\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860298 kubelet[2057]: I0508 00:52:26.860284 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-cni-log-dir\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860415 kubelet[2057]: I0508 00:52:26.860380 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-cni-net-dir\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860524 kubelet[2057]: I0508 00:52:26.860510 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-cni-bin-dir\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860624 kubelet[2057]: I0508 00:52:26.860609 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f348512d-94c7-49c3-9474-3b1a353008ce-node-certs\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860713 kubelet[2057]: I0508 00:52:26.860700 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-var-lib-calico\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860803 kubelet[2057]: I0508 00:52:26.860787 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-flexvol-driver-host\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860896 kubelet[2057]: I0508 00:52:26.860883 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f348512d-94c7-49c3-9474-3b1a353008ce-policysync\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.860987 kubelet[2057]: I0508 00:52:26.860974 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nh6v2\" (UniqueName: \"kubernetes.io/projected/f348512d-94c7-49c3-9474-3b1a353008ce-kube-api-access-nh6v2\") pod \"calico-node-bb4t4\" (UID: \"f348512d-94c7-49c3-9474-3b1a353008ce\") " pod="calico-system/calico-node-bb4t4" May 8 00:52:26.891971 kubelet[2057]: E0508 00:52:26.891943 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:26.892445 env[1219]: time="2025-05-08T00:52:26.892379797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cd8f6d874-9fx7g,Uid:d93e54d2-c75f-4207-87a1-dac5d37670d1,Namespace:calico-system,Attempt:0,}" May 8 00:52:26.911697 env[1219]: time="2025-05-08T00:52:26.911628780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:26.911848 env[1219]: time="2025-05-08T00:52:26.911824651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:26.911950 env[1219]: time="2025-05-08T00:52:26.911928008Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:26.912266 env[1219]: time="2025-05-08T00:52:26.912232279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4074a1b58d713cc934795457283f97453dbf32484daff7815b758761b832c50 pid=2452 runtime=io.containerd.runc.v2 May 8 00:52:26.927314 systemd[1]: Started cri-containerd-b4074a1b58d713cc934795457283f97453dbf32484daff7815b758761b832c50.scope. May 8 00:52:26.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.953000 audit: BPF prog-id=121 op=LOAD May 8 00:52:26.954000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.954000 audit[2462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2452 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234303734613162353864373133636339333437393534353732383366 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2452 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234303734613162353864373133636339333437393534353732383366 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.955000 audit: BPF prog-id=122 op=LOAD May 8 00:52:26.955000 audit[2462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2452 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234303734613162353864373133636339333437393534353732383366 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.956000 audit: BPF prog-id=123 op=LOAD May 8 00:52:26.956000 audit[2462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2452 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234303734613162353864373133636339333437393534353732383366 May 8 00:52:26.956000 audit: BPF prog-id=123 op=UNLOAD May 8 00:52:26.956000 audit: BPF prog-id=122 op=UNLOAD May 8 00:52:26.957000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:26.957000 audit: BPF prog-id=124 op=LOAD May 8 00:52:26.957000 audit[2462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2452 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:26.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234303734613162353864373133636339333437393534353732383366 May 8 00:52:26.967544 kubelet[2057]: E0508 00:52:26.966629 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.967544 kubelet[2057]: W0508 00:52:26.966652 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.967544 kubelet[2057]: E0508 00:52:26.966671 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.967544 kubelet[2057]: I0508 00:52:26.967008 2057 topology_manager.go:215] "Topology Admit Handler" podUID="f79535ef-7f28-43da-af71-72d8363737d7" podNamespace="calico-system" podName="csi-node-driver-k6ltj" May 8 00:52:26.967544 kubelet[2057]: E0508 00:52:26.967251 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:26.970497 kubelet[2057]: E0508 00:52:26.970455 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.970497 kubelet[2057]: W0508 00:52:26.970477 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.970497 kubelet[2057]: E0508 00:52:26.970492 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.970909 kubelet[2057]: E0508 00:52:26.970876 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.970909 kubelet[2057]: W0508 00:52:26.970891 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.970909 kubelet[2057]: E0508 00:52:26.970902 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.971183 kubelet[2057]: E0508 00:52:26.971165 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.971183 kubelet[2057]: W0508 00:52:26.971182 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.971256 kubelet[2057]: E0508 00:52:26.971196 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.972508 kubelet[2057]: E0508 00:52:26.972483 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.972508 kubelet[2057]: W0508 00:52:26.972501 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.972622 kubelet[2057]: E0508 00:52:26.972514 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.977383 kubelet[2057]: E0508 00:52:26.976309 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:26.977383 kubelet[2057]: W0508 00:52:26.976337 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:26.977383 kubelet[2057]: E0508 00:52:26.976352 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:26.984971 env[1219]: time="2025-05-08T00:52:26.984664036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cd8f6d874-9fx7g,Uid:d93e54d2-c75f-4207-87a1-dac5d37670d1,Namespace:calico-system,Attempt:0,} returns sandbox id \"b4074a1b58d713cc934795457283f97453dbf32484daff7815b758761b832c50\"" May 8 00:52:26.985633 kubelet[2057]: E0508 00:52:26.985611 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:26.986514 env[1219]: time="2025-05-08T00:52:26.986472092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:52:27.053066 kubelet[2057]: E0508 00:52:27.053016 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053066 kubelet[2057]: W0508 00:52:27.053040 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053066 kubelet[2057]: E0508 00:52:27.053060 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053257 kubelet[2057]: E0508 00:52:27.053196 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053257 kubelet[2057]: W0508 00:52:27.053205 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053257 kubelet[2057]: E0508 00:52:27.053213 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053441 kubelet[2057]: E0508 00:52:27.053352 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053441 kubelet[2057]: W0508 00:52:27.053363 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053441 kubelet[2057]: E0508 00:52:27.053371 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053536 kubelet[2057]: E0508 00:52:27.053523 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053536 kubelet[2057]: W0508 00:52:27.053533 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053583 kubelet[2057]: E0508 00:52:27.053541 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053699 kubelet[2057]: E0508 00:52:27.053682 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053699 kubelet[2057]: W0508 00:52:27.053692 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053699 kubelet[2057]: E0508 00:52:27.053699 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053860 kubelet[2057]: E0508 00:52:27.053825 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053860 kubelet[2057]: W0508 00:52:27.053834 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.053860 kubelet[2057]: E0508 00:52:27.053841 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.053968 kubelet[2057]: E0508 00:52:27.053957 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.053968 kubelet[2057]: W0508 00:52:27.053966 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054018 kubelet[2057]: E0508 00:52:27.053973 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.054100 kubelet[2057]: E0508 00:52:27.054090 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.054155 kubelet[2057]: W0508 00:52:27.054099 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054155 kubelet[2057]: E0508 00:52:27.054107 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.054297 kubelet[2057]: E0508 00:52:27.054230 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.054297 kubelet[2057]: W0508 00:52:27.054236 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054297 kubelet[2057]: E0508 00:52:27.054243 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.054414 kubelet[2057]: E0508 00:52:27.054374 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.054414 kubelet[2057]: W0508 00:52:27.054383 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054414 kubelet[2057]: E0508 00:52:27.054403 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.054571 kubelet[2057]: E0508 00:52:27.054550 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.054571 kubelet[2057]: W0508 00:52:27.054563 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054571 kubelet[2057]: E0508 00:52:27.054573 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.054834 kubelet[2057]: E0508 00:52:27.054739 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.054834 kubelet[2057]: W0508 00:52:27.054753 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.054834 kubelet[2057]: E0508 00:52:27.054763 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055533 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057414 kubelet[2057]: W0508 00:52:27.055551 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055564 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055760 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057414 kubelet[2057]: W0508 00:52:27.055768 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055776 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055915 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057414 kubelet[2057]: W0508 00:52:27.055922 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.055930 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057414 kubelet[2057]: E0508 00:52:27.056046 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057919 kubelet[2057]: W0508 00:52:27.056053 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056060 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056180 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057919 kubelet[2057]: W0508 00:52:27.056187 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056194 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056294 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057919 kubelet[2057]: W0508 00:52:27.056302 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056309 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.057919 kubelet[2057]: E0508 00:52:27.056437 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.057919 kubelet[2057]: W0508 00:52:27.056444 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.058159 kubelet[2057]: E0508 00:52:27.056452 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.058159 kubelet[2057]: E0508 00:52:27.056562 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.058159 kubelet[2057]: W0508 00:52:27.056569 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.058159 kubelet[2057]: E0508 00:52:27.056575 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.063432 kubelet[2057]: E0508 00:52:27.062810 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.063432 kubelet[2057]: W0508 00:52:27.062872 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.063432 kubelet[2057]: E0508 00:52:27.062888 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.063432 kubelet[2057]: I0508 00:52:27.062910 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k4dmg\" (UniqueName: \"kubernetes.io/projected/f79535ef-7f28-43da-af71-72d8363737d7-kube-api-access-k4dmg\") pod \"csi-node-driver-k6ltj\" (UID: \"f79535ef-7f28-43da-af71-72d8363737d7\") " pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:27.063432 kubelet[2057]: E0508 00:52:27.063169 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.063432 kubelet[2057]: W0508 00:52:27.063181 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.063432 kubelet[2057]: E0508 00:52:27.063191 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.063432 kubelet[2057]: I0508 00:52:27.063215 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f79535ef-7f28-43da-af71-72d8363737d7-kubelet-dir\") pod \"csi-node-driver-k6ltj\" (UID: \"f79535ef-7f28-43da-af71-72d8363737d7\") " pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:27.063686 kubelet[2057]: E0508 00:52:27.063560 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.063686 kubelet[2057]: W0508 00:52:27.063573 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.063686 kubelet[2057]: E0508 00:52:27.063586 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.063686 kubelet[2057]: I0508 00:52:27.063604 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f79535ef-7f28-43da-af71-72d8363737d7-registration-dir\") pod \"csi-node-driver-k6ltj\" (UID: \"f79535ef-7f28-43da-af71-72d8363737d7\") " pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:27.065862 kubelet[2057]: E0508 00:52:27.064725 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.065862 kubelet[2057]: W0508 00:52:27.064742 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.065862 kubelet[2057]: E0508 00:52:27.064756 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.065862 kubelet[2057]: I0508 00:52:27.064777 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f79535ef-7f28-43da-af71-72d8363737d7-varrun\") pod \"csi-node-driver-k6ltj\" (UID: \"f79535ef-7f28-43da-af71-72d8363737d7\") " pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:27.065862 kubelet[2057]: E0508 00:52:27.064970 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.065862 kubelet[2057]: W0508 00:52:27.064980 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.065862 kubelet[2057]: E0508 00:52:27.065034 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.065862 kubelet[2057]: I0508 00:52:27.065059 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f79535ef-7f28-43da-af71-72d8363737d7-socket-dir\") pod \"csi-node-driver-k6ltj\" (UID: \"f79535ef-7f28-43da-af71-72d8363737d7\") " pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:27.065862 kubelet[2057]: E0508 00:52:27.065203 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066152 kubelet[2057]: W0508 00:52:27.065213 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065268 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065358 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066152 kubelet[2057]: W0508 00:52:27.065372 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065435 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065584 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066152 kubelet[2057]: W0508 00:52:27.065594 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065779 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066152 kubelet[2057]: W0508 00:52:27.065789 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066152 kubelet[2057]: E0508 00:52:27.065802 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.065832 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066032 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066511 kubelet[2057]: W0508 00:52:27.066043 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066052 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066183 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066511 kubelet[2057]: W0508 00:52:27.066190 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066197 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066331 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066511 kubelet[2057]: W0508 00:52:27.066338 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066511 kubelet[2057]: E0508 00:52:27.066345 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066741 kubelet[2057]: E0508 00:52:27.066523 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066741 kubelet[2057]: W0508 00:52:27.066531 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066741 kubelet[2057]: E0508 00:52:27.066540 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066741 kubelet[2057]: E0508 00:52:27.066686 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066741 kubelet[2057]: W0508 00:52:27.066694 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066741 kubelet[2057]: E0508 00:52:27.066702 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.066865 kubelet[2057]: E0508 00:52:27.066831 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.066865 kubelet[2057]: W0508 00:52:27.066838 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.066865 kubelet[2057]: E0508 00:52:27.066848 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.088244 kubelet[2057]: E0508 00:52:27.088207 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:27.088884 env[1219]: time="2025-05-08T00:52:27.088832960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bb4t4,Uid:f348512d-94c7-49c3-9474-3b1a353008ce,Namespace:calico-system,Attempt:0,}" May 8 00:52:27.103679 env[1219]: time="2025-05-08T00:52:27.103598616Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:27.103679 env[1219]: time="2025-05-08T00:52:27.103643872Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:27.103679 env[1219]: time="2025-05-08T00:52:27.103654556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:27.104356 env[1219]: time="2025-05-08T00:52:27.104090907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13 pid=2535 runtime=io.containerd.runc.v2 May 8 00:52:27.115591 systemd[1]: Started cri-containerd-d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13.scope. May 8 00:52:27.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit: BPF prog-id=125 op=LOAD May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383363336664663764626531313736306631383765356137303435 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383363336664663764626531313736306631383765356137303435 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.134000 audit: BPF prog-id=126 op=LOAD May 8 00:52:27.134000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383363336664663764626531313736306631383765356137303435 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit: BPF prog-id=127 op=LOAD May 8 00:52:27.135000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383363336664663764626531313736306631383765356137303435 May 8 00:52:27.135000 audit: BPF prog-id=127 op=UNLOAD May 8 00:52:27.135000 audit: BPF prog-id=126 op=UNLOAD May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:27.135000 audit: BPF prog-id=128 op=LOAD May 8 00:52:27.135000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:27.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383363336664663764626531313736306631383765356137303435 May 8 00:52:27.149219 env[1219]: time="2025-05-08T00:52:27.149177751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bb4t4,Uid:f348512d-94c7-49c3-9474-3b1a353008ce,Namespace:calico-system,Attempt:0,} returns sandbox id \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\"" May 8 00:52:27.150277 kubelet[2057]: E0508 00:52:27.150231 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:27.166078 kubelet[2057]: E0508 00:52:27.166042 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.166078 kubelet[2057]: W0508 00:52:27.166064 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.166078 kubelet[2057]: E0508 00:52:27.166082 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.166317 kubelet[2057]: E0508 00:52:27.166294 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.166317 kubelet[2057]: W0508 00:52:27.166306 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.166317 kubelet[2057]: E0508 00:52:27.166319 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.166567 kubelet[2057]: E0508 00:52:27.166544 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.166567 kubelet[2057]: W0508 00:52:27.166556 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.166654 kubelet[2057]: E0508 00:52:27.166570 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.166759 kubelet[2057]: E0508 00:52:27.166733 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.166759 kubelet[2057]: W0508 00:52:27.166744 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.166759 kubelet[2057]: E0508 00:52:27.166753 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.166972 kubelet[2057]: E0508 00:52:27.166953 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.166972 kubelet[2057]: W0508 00:52:27.166964 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167026 kubelet[2057]: E0508 00:52:27.166974 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167148 kubelet[2057]: E0508 00:52:27.167138 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167173 kubelet[2057]: W0508 00:52:27.167148 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167173 kubelet[2057]: E0508 00:52:27.167160 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167304 kubelet[2057]: E0508 00:52:27.167294 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167329 kubelet[2057]: W0508 00:52:27.167304 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167369 kubelet[2057]: E0508 00:52:27.167350 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167458 kubelet[2057]: E0508 00:52:27.167447 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167493 kubelet[2057]: W0508 00:52:27.167464 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167493 kubelet[2057]: E0508 00:52:27.167487 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167616 kubelet[2057]: E0508 00:52:27.167604 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167642 kubelet[2057]: W0508 00:52:27.167617 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167692 kubelet[2057]: E0508 00:52:27.167681 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167752 kubelet[2057]: E0508 00:52:27.167742 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167779 kubelet[2057]: W0508 00:52:27.167753 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167779 kubelet[2057]: E0508 00:52:27.167763 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.167909 kubelet[2057]: E0508 00:52:27.167898 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.167933 kubelet[2057]: W0508 00:52:27.167909 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.167933 kubelet[2057]: E0508 00:52:27.167917 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168046 kubelet[2057]: E0508 00:52:27.168036 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168071 kubelet[2057]: W0508 00:52:27.168046 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168115 kubelet[2057]: E0508 00:52:27.168103 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168176 kubelet[2057]: E0508 00:52:27.168166 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168199 kubelet[2057]: W0508 00:52:27.168176 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168245 kubelet[2057]: E0508 00:52:27.168234 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168314 kubelet[2057]: E0508 00:52:27.168305 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168339 kubelet[2057]: W0508 00:52:27.168314 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168339 kubelet[2057]: E0508 00:52:27.168324 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168608 kubelet[2057]: E0508 00:52:27.168591 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168608 kubelet[2057]: W0508 00:52:27.168607 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168691 kubelet[2057]: E0508 00:52:27.168678 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168751 kubelet[2057]: E0508 00:52:27.168741 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168776 kubelet[2057]: W0508 00:52:27.168752 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168833 kubelet[2057]: E0508 00:52:27.168821 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.168903 kubelet[2057]: E0508 00:52:27.168893 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.168903 kubelet[2057]: W0508 00:52:27.168903 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.168992 kubelet[2057]: E0508 00:52:27.168980 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.169050 kubelet[2057]: E0508 00:52:27.169041 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.169078 kubelet[2057]: W0508 00:52:27.169051 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.169078 kubelet[2057]: E0508 00:52:27.169061 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.169433 kubelet[2057]: E0508 00:52:27.169419 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.169433 kubelet[2057]: W0508 00:52:27.169433 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.169515 kubelet[2057]: E0508 00:52:27.169446 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.169617 kubelet[2057]: E0508 00:52:27.169604 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.169647 kubelet[2057]: W0508 00:52:27.169615 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.169647 kubelet[2057]: E0508 00:52:27.169630 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.169818 kubelet[2057]: E0508 00:52:27.169805 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.169818 kubelet[2057]: W0508 00:52:27.169816 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.169877 kubelet[2057]: E0508 00:52:27.169827 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.169997 kubelet[2057]: E0508 00:52:27.169984 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.169997 kubelet[2057]: W0508 00:52:27.169995 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.170049 kubelet[2057]: E0508 00:52:27.170006 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.170204 kubelet[2057]: E0508 00:52:27.170188 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.170238 kubelet[2057]: W0508 00:52:27.170205 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.170275 kubelet[2057]: E0508 00:52:27.170260 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.170467 kubelet[2057]: E0508 00:52:27.170450 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.170544 kubelet[2057]: W0508 00:52:27.170468 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.170569 kubelet[2057]: E0508 00:52:27.170549 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.170964 kubelet[2057]: E0508 00:52:27.170940 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.170964 kubelet[2057]: W0508 00:52:27.170955 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.171025 kubelet[2057]: E0508 00:52:27.170966 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:27.178705 kubelet[2057]: E0508 00:52:27.178683 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:27.178705 kubelet[2057]: W0508 00:52:27.178700 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:27.178811 kubelet[2057]: E0508 00:52:27.178711 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:28.579051 env[1219]: time="2025-05-08T00:52:28.578996201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:28.580837 env[1219]: time="2025-05-08T00:52:28.580806045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:28.582273 env[1219]: time="2025-05-08T00:52:28.582247486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:28.583617 env[1219]: time="2025-05-08T00:52:28.583589014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:28.584151 env[1219]: time="2025-05-08T00:52:28.584125153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 8 00:52:28.590451 env[1219]: time="2025-05-08T00:52:28.590424656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:52:28.600933 env[1219]: time="2025-05-08T00:52:28.600861340Z" level=info msg="CreateContainer within sandbox \"b4074a1b58d713cc934795457283f97453dbf32484daff7815b758761b832c50\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:52:28.614056 env[1219]: time="2025-05-08T00:52:28.614012851Z" level=info msg="CreateContainer within sandbox \"b4074a1b58d713cc934795457283f97453dbf32484daff7815b758761b832c50\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"bfa52e55ad24075d6030b2975e115d1b6324be4647122bd425bc9a7e07e7f509\"" May 8 00:52:28.615322 env[1219]: time="2025-05-08T00:52:28.615294479Z" level=info msg="StartContainer for \"bfa52e55ad24075d6030b2975e115d1b6324be4647122bd425bc9a7e07e7f509\"" May 8 00:52:28.629560 systemd[1]: Started cri-containerd-bfa52e55ad24075d6030b2975e115d1b6324be4647122bd425bc9a7e07e7f509.scope. May 8 00:52:28.671661 kernel: kauditd_printk_skb: 179 callbacks suppressed May 8 00:52:28.671763 kernel: audit: type=1400 audit(1746665548.665:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.671791 kernel: audit: type=1400 audit(1746665548.665:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.674224 kernel: audit: type=1400 audit(1746665548.665:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.677251 kernel: audit: type=1400 audit(1746665548.665:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.679633 kernel: audit: type=1400 audit(1746665548.665:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.679748 kernel: audit: type=1400 audit(1746665548.665:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.684195 kernel: audit: type=1400 audit(1746665548.665:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.686701 kernel: audit: type=1400 audit(1746665548.665:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.689029 kernel: audit: type=1400 audit(1746665548.665:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.689117 kernel: audit: type=1400 audit(1746665548.665:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.665000 audit: BPF prog-id=129 op=LOAD May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2452 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:28.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266613532653535616432343037356436303330623239373565313135 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2452 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:28.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266613532653535616432343037356436303330623239373565313135 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit: BPF prog-id=130 op=LOAD May 8 00:52:28.666000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2452 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:28.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266613532653535616432343037356436303330623239373565313135 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.666000 audit: BPF prog-id=131 op=LOAD May 8 00:52:28.666000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2452 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:28.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266613532653535616432343037356436303330623239373565313135 May 8 00:52:28.668000 audit: BPF prog-id=131 op=UNLOAD May 8 00:52:28.668000 audit: BPF prog-id=130 op=UNLOAD May 8 00:52:28.669000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:28.669000 audit: BPF prog-id=132 op=LOAD May 8 00:52:28.669000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2452 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:28.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266613532653535616432343037356436303330623239373565313135 May 8 00:52:28.698708 env[1219]: time="2025-05-08T00:52:28.698649826Z" level=info msg="StartContainer for \"bfa52e55ad24075d6030b2975e115d1b6324be4647122bd425bc9a7e07e7f509\" returns successfully" May 8 00:52:29.021030 kubelet[2057]: E0508 00:52:29.020980 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:29.078835 kubelet[2057]: E0508 00:52:29.078804 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:29.098634 kubelet[2057]: I0508 00:52:29.098492 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5cd8f6d874-9fx7g" podStartSLOduration=1.494386197 podStartE2EDuration="3.098411393s" podCreationTimestamp="2025-05-08 00:52:26 +0000 UTC" firstStartedPulling="2025-05-08 00:52:26.986239367 +0000 UTC m=+25.086996587" lastFinishedPulling="2025-05-08 00:52:28.590264563 +0000 UTC m=+26.691021783" observedRunningTime="2025-05-08 00:52:29.097751742 +0000 UTC m=+27.198508922" watchObservedRunningTime="2025-05-08 00:52:29.098411393 +0000 UTC m=+27.199168613" May 8 00:52:29.172672 kubelet[2057]: E0508 00:52:29.172631 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.172672 kubelet[2057]: W0508 00:52:29.172654 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.172672 kubelet[2057]: E0508 00:52:29.172673 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.172891 kubelet[2057]: E0508 00:52:29.172876 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.172891 kubelet[2057]: W0508 00:52:29.172888 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.172951 kubelet[2057]: E0508 00:52:29.172898 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173076 kubelet[2057]: E0508 00:52:29.173048 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173076 kubelet[2057]: W0508 00:52:29.173060 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173076 kubelet[2057]: E0508 00:52:29.173076 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173223 kubelet[2057]: E0508 00:52:29.173211 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173223 kubelet[2057]: W0508 00:52:29.173221 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173288 kubelet[2057]: E0508 00:52:29.173237 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173401 kubelet[2057]: E0508 00:52:29.173370 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173401 kubelet[2057]: W0508 00:52:29.173401 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173474 kubelet[2057]: E0508 00:52:29.173410 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173542 kubelet[2057]: E0508 00:52:29.173531 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173542 kubelet[2057]: W0508 00:52:29.173540 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173600 kubelet[2057]: E0508 00:52:29.173556 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173694 kubelet[2057]: E0508 00:52:29.173672 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173694 kubelet[2057]: W0508 00:52:29.173682 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173694 kubelet[2057]: E0508 00:52:29.173689 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.173835 kubelet[2057]: E0508 00:52:29.173824 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.173865 kubelet[2057]: W0508 00:52:29.173835 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.173865 kubelet[2057]: E0508 00:52:29.173843 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174053 kubelet[2057]: E0508 00:52:29.174039 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174053 kubelet[2057]: W0508 00:52:29.174051 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174121 kubelet[2057]: E0508 00:52:29.174059 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174223 kubelet[2057]: E0508 00:52:29.174210 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174223 kubelet[2057]: W0508 00:52:29.174220 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174280 kubelet[2057]: E0508 00:52:29.174229 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174380 kubelet[2057]: E0508 00:52:29.174369 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174380 kubelet[2057]: W0508 00:52:29.174378 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174449 kubelet[2057]: E0508 00:52:29.174385 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174531 kubelet[2057]: E0508 00:52:29.174521 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174531 kubelet[2057]: W0508 00:52:29.174530 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174581 kubelet[2057]: E0508 00:52:29.174537 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174680 kubelet[2057]: E0508 00:52:29.174669 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174704 kubelet[2057]: W0508 00:52:29.174680 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174704 kubelet[2057]: E0508 00:52:29.174689 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.174828 kubelet[2057]: E0508 00:52:29.174818 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.174828 kubelet[2057]: W0508 00:52:29.174827 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.174876 kubelet[2057]: E0508 00:52:29.174834 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.175016 kubelet[2057]: E0508 00:52:29.175004 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.175016 kubelet[2057]: W0508 00:52:29.175014 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.175170 kubelet[2057]: E0508 00:52:29.175021 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.179338 kubelet[2057]: E0508 00:52:29.179307 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.179338 kubelet[2057]: W0508 00:52:29.179326 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.179338 kubelet[2057]: E0508 00:52:29.179340 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.179583 kubelet[2057]: E0508 00:52:29.179562 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.179583 kubelet[2057]: W0508 00:52:29.179577 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.179646 kubelet[2057]: E0508 00:52:29.179593 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.179831 kubelet[2057]: E0508 00:52:29.179802 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.179831 kubelet[2057]: W0508 00:52:29.179820 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.179899 kubelet[2057]: E0508 00:52:29.179836 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.180057 kubelet[2057]: E0508 00:52:29.180032 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.180057 kubelet[2057]: W0508 00:52:29.180045 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.180057 kubelet[2057]: E0508 00:52:29.180057 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.180219 kubelet[2057]: E0508 00:52:29.180199 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.180219 kubelet[2057]: W0508 00:52:29.180211 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.180277 kubelet[2057]: E0508 00:52:29.180223 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.181353 kubelet[2057]: E0508 00:52:29.181326 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.181353 kubelet[2057]: W0508 00:52:29.181343 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.181484 kubelet[2057]: E0508 00:52:29.181359 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.181657 kubelet[2057]: E0508 00:52:29.181628 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.181657 kubelet[2057]: W0508 00:52:29.181645 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.181715 kubelet[2057]: E0508 00:52:29.181662 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.181901 kubelet[2057]: E0508 00:52:29.181877 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.181901 kubelet[2057]: W0508 00:52:29.181891 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.181975 kubelet[2057]: E0508 00:52:29.181926 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.182043 kubelet[2057]: E0508 00:52:29.182031 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.182043 kubelet[2057]: W0508 00:52:29.182041 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.182092 kubelet[2057]: E0508 00:52:29.182062 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.182227 kubelet[2057]: E0508 00:52:29.182208 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.182227 kubelet[2057]: W0508 00:52:29.182219 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.182288 kubelet[2057]: E0508 00:52:29.182233 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.182412 kubelet[2057]: E0508 00:52:29.182384 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.182451 kubelet[2057]: W0508 00:52:29.182409 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.182451 kubelet[2057]: E0508 00:52:29.182434 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.182679 kubelet[2057]: E0508 00:52:29.182652 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.182679 kubelet[2057]: W0508 00:52:29.182670 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.182745 kubelet[2057]: E0508 00:52:29.182687 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.182891 kubelet[2057]: E0508 00:52:29.182875 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.182891 kubelet[2057]: W0508 00:52:29.182889 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.182946 kubelet[2057]: E0508 00:52:29.182904 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.183053 kubelet[2057]: E0508 00:52:29.183041 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.183083 kubelet[2057]: W0508 00:52:29.183052 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.183083 kubelet[2057]: E0508 00:52:29.183064 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.183246 kubelet[2057]: E0508 00:52:29.183234 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.183246 kubelet[2057]: W0508 00:52:29.183244 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.183314 kubelet[2057]: E0508 00:52:29.183256 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.183489 kubelet[2057]: E0508 00:52:29.183475 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.183520 kubelet[2057]: W0508 00:52:29.183488 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.183520 kubelet[2057]: E0508 00:52:29.183499 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.183710 kubelet[2057]: E0508 00:52:29.183695 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.183710 kubelet[2057]: W0508 00:52:29.183708 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.183777 kubelet[2057]: E0508 00:52:29.183719 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.183893 kubelet[2057]: E0508 00:52:29.183879 2057 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:52:29.183921 kubelet[2057]: W0508 00:52:29.183896 2057 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:52:29.183921 kubelet[2057]: E0508 00:52:29.183904 2057 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:52:29.712743 env[1219]: time="2025-05-08T00:52:29.712696596Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:29.714189 env[1219]: time="2025-05-08T00:52:29.714155184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:29.715458 env[1219]: time="2025-05-08T00:52:29.715422831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:29.716939 env[1219]: time="2025-05-08T00:52:29.716905386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:29.717406 env[1219]: time="2025-05-08T00:52:29.717352810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 8 00:52:29.721233 env[1219]: time="2025-05-08T00:52:29.721201484Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:52:29.736454 env[1219]: time="2025-05-08T00:52:29.736381392Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c\"" May 8 00:52:29.737851 env[1219]: time="2025-05-08T00:52:29.737815532Z" level=info msg="StartContainer for \"cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c\"" May 8 00:52:29.772997 systemd[1]: run-containerd-runc-k8s.io-cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c-runc.UFIlHQ.mount: Deactivated successfully. May 8 00:52:29.778588 systemd[1]: Started cri-containerd-cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c.scope. May 8 00:52:29.809000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.809000 audit[2678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=2535 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364363862653765303139376433636235636433383465333031396163 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit: BPF prog-id=133 op=LOAD May 8 00:52:29.810000 audit[2678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=2535 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:29.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364363862653765303139376433636235636433383465333031396163 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit: BPF prog-id=134 op=LOAD May 8 00:52:29.810000 audit[2678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=2535 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:29.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364363862653765303139376433636235636433383465333031396163 May 8 00:52:29.810000 audit: BPF prog-id=134 op=UNLOAD May 8 00:52:29.810000 audit: BPF prog-id=133 op=UNLOAD May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:29.810000 audit: BPF prog-id=135 op=LOAD May 8 00:52:29.810000 audit[2678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=2535 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:29.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364363862653765303139376433636235636433383465333031396163 May 8 00:52:29.826835 env[1219]: time="2025-05-08T00:52:29.826792787Z" level=info msg="StartContainer for \"cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c\" returns successfully" May 8 00:52:29.852848 systemd[1]: cri-containerd-cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c.scope: Deactivated successfully. May 8 00:52:29.857000 audit: BPF prog-id=135 op=UNLOAD May 8 00:52:29.871922 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c-rootfs.mount: Deactivated successfully. May 8 00:52:29.976204 env[1219]: time="2025-05-08T00:52:29.976086386Z" level=info msg="shim disconnected" id=cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c May 8 00:52:29.976450 env[1219]: time="2025-05-08T00:52:29.976426775Z" level=warning msg="cleaning up after shim disconnected" id=cd68be7e0197d3cb5cd384e3019acc42be6fe761af2dc3ea896f0b1c7b28731c namespace=k8s.io May 8 00:52:29.976521 env[1219]: time="2025-05-08T00:52:29.976507681Z" level=info msg="cleaning up dead shim" May 8 00:52:29.983968 env[1219]: time="2025-05-08T00:52:29.983931982Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:52:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2716 runtime=io.containerd.runc.v2\n" May 8 00:52:30.082638 kubelet[2057]: E0508 00:52:30.082412 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:30.082638 kubelet[2057]: E0508 00:52:30.082490 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:30.083702 env[1219]: time="2025-05-08T00:52:30.083665434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:52:30.118000 audit[2730]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:30.118000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffedc49bc0 a2=0 a3=1 items=0 ppid=2220 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:30.128000 audit[2730]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:30.128000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffedc49bc0 a2=0 a3=1 items=0 ppid=2220 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:30.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.127:22-10.0.0.1:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:30.773531 systemd[1]: Started sshd@7-10.0.0.127:22-10.0.0.1:52604.service. May 8 00:52:30.816000 audit[2737]: USER_ACCT pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.818471 sshd[2737]: Accepted publickey for core from 10.0.0.1 port 52604 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:30.818000 audit[2737]: CRED_ACQ pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.818000 audit[2737]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4e30af0 a2=3 a3=1 items=0 ppid=1 pid=2737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:30.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:30.820035 sshd[2737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:30.824258 systemd[1]: Started session-8.scope. May 8 00:52:30.824733 systemd-logind[1205]: New session 8 of user core. May 8 00:52:30.829000 audit[2737]: USER_START pid=2737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.831000 audit[2739]: CRED_ACQ pid=2739 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.954444 sshd[2737]: pam_unix(sshd:session): session closed for user core May 8 00:52:30.953000 audit[2737]: USER_END pid=2737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.954000 audit[2737]: CRED_DISP pid=2737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:30.958239 systemd[1]: sshd@7-10.0.0.127:22-10.0.0.1:52604.service: Deactivated successfully. May 8 00:52:30.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.127:22-10.0.0.1:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:30.958962 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:52:30.959881 systemd-logind[1205]: Session 8 logged out. Waiting for processes to exit. May 8 00:52:30.961558 systemd-logind[1205]: Removed session 8. May 8 00:52:31.020204 kubelet[2057]: E0508 00:52:31.020160 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:31.091199 kubelet[2057]: E0508 00:52:31.090806 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:32.092053 kubelet[2057]: E0508 00:52:32.091691 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:33.019323 kubelet[2057]: E0508 00:52:33.019258 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:33.397685 env[1219]: time="2025-05-08T00:52:33.397621671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.399615 env[1219]: time="2025-05-08T00:52:33.399584212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.401746 env[1219]: time="2025-05-08T00:52:33.401718121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.403428 env[1219]: time="2025-05-08T00:52:33.403384420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:33.404119 env[1219]: time="2025-05-08T00:52:33.404086614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 8 00:52:33.406925 env[1219]: time="2025-05-08T00:52:33.406236087Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:52:33.420138 env[1219]: time="2025-05-08T00:52:33.420096031Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32\"" May 8 00:52:33.420775 env[1219]: time="2025-05-08T00:52:33.420747090Z" level=info msg="StartContainer for \"fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32\"" May 8 00:52:33.437748 systemd[1]: Started cri-containerd-fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32.scope. May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2535 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333831383662383430343334366466326631643732376333393838 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.474000 audit: BPF prog-id=136 op=LOAD May 8 00:52:33.474000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2535 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333831383662383430343334366466326631643732376333393838 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit: BPF prog-id=137 op=LOAD May 8 00:52:33.475000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2535 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333831383662383430343334366466326631643732376333393838 May 8 00:52:33.475000 audit: BPF prog-id=137 op=UNLOAD May 8 00:52:33.475000 audit: BPF prog-id=136 op=UNLOAD May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:33.475000 audit: BPF prog-id=138 op=LOAD May 8 00:52:33.475000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2535 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:33.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333831383662383430343334366466326631643732376333393838 May 8 00:52:33.488705 env[1219]: time="2025-05-08T00:52:33.488536872Z" level=info msg="StartContainer for \"fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32\" returns successfully" May 8 00:52:34.090285 env[1219]: time="2025-05-08T00:52:34.090110072Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:52:34.092093 systemd[1]: cri-containerd-fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32.scope: Deactivated successfully. May 8 00:52:34.094000 audit: BPF prog-id=138 op=UNLOAD May 8 00:52:34.096407 kernel: kauditd_printk_skb: 151 callbacks suppressed May 8 00:52:34.096492 kernel: audit: type=1334 audit(1746665554.094:1020): prog-id=138 op=UNLOAD May 8 00:52:34.096523 kubelet[2057]: E0508 00:52:34.096470 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:34.102953 kubelet[2057]: I0508 00:52:34.102820 2057 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 8 00:52:34.121380 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32-rootfs.mount: Deactivated successfully. May 8 00:52:34.140257 kubelet[2057]: I0508 00:52:34.138549 2057 topology_manager.go:215] "Topology Admit Handler" podUID="b02b9103-7c5d-4a1c-aab1-9c7de87e2acb" podNamespace="kube-system" podName="coredns-7db6d8ff4d-dblrj" May 8 00:52:34.179291 kubelet[2057]: I0508 00:52:34.179234 2057 topology_manager.go:215] "Topology Admit Handler" podUID="a9bf23e9-64ea-441a-ac81-81de620871c1" podNamespace="calico-apiserver" podName="calico-apiserver-5bd8f59f4b-ngzh4" May 8 00:52:34.179489 kubelet[2057]: I0508 00:52:34.179464 2057 topology_manager.go:215] "Topology Admit Handler" podUID="55c5af30-5df0-482a-8414-c894f1318ee7" podNamespace="calico-apiserver" podName="calico-apiserver-5bd8f59f4b-2flcf" May 8 00:52:34.180016 kubelet[2057]: I0508 00:52:34.179975 2057 topology_manager.go:215] "Topology Admit Handler" podUID="e4ca0235-7684-4362-b53c-97dd22ef8685" podNamespace="calico-system" podName="calico-kube-controllers-876857c46-494nx" May 8 00:52:34.180360 kubelet[2057]: I0508 00:52:34.180329 2057 topology_manager.go:215] "Topology Admit Handler" podUID="03263d58-45c7-4ef8-ad8f-306f81cb08d9" podNamespace="kube-system" podName="coredns-7db6d8ff4d-x9jqs" May 8 00:52:34.185750 systemd[1]: Created slice kubepods-burstable-podb02b9103_7c5d_4a1c_aab1_9c7de87e2acb.slice. May 8 00:52:34.186942 env[1219]: time="2025-05-08T00:52:34.186891491Z" level=info msg="shim disconnected" id=fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32 May 8 00:52:34.186942 env[1219]: time="2025-05-08T00:52:34.186940785Z" level=warning msg="cleaning up after shim disconnected" id=fd38186b8404346df2f1d727c398895cf8ad587d5d5272a26e7c77b3c31d7f32 namespace=k8s.io May 8 00:52:34.187057 env[1219]: time="2025-05-08T00:52:34.186949307Z" level=info msg="cleaning up dead shim" May 8 00:52:34.190757 kubelet[2057]: I0508 00:52:34.190729 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/55c5af30-5df0-482a-8414-c894f1318ee7-calico-apiserver-certs\") pod \"calico-apiserver-5bd8f59f4b-2flcf\" (UID: \"55c5af30-5df0-482a-8414-c894f1318ee7\") " pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" May 8 00:52:34.190916 kubelet[2057]: I0508 00:52:34.190896 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5k5pj\" (UniqueName: \"kubernetes.io/projected/55c5af30-5df0-482a-8414-c894f1318ee7-kube-api-access-5k5pj\") pod \"calico-apiserver-5bd8f59f4b-2flcf\" (UID: \"55c5af30-5df0-482a-8414-c894f1318ee7\") " pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" May 8 00:52:34.191107 kubelet[2057]: I0508 00:52:34.191065 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktmx8\" (UniqueName: \"kubernetes.io/projected/e4ca0235-7684-4362-b53c-97dd22ef8685-kube-api-access-ktmx8\") pod \"calico-kube-controllers-876857c46-494nx\" (UID: \"e4ca0235-7684-4362-b53c-97dd22ef8685\") " pod="calico-system/calico-kube-controllers-876857c46-494nx" May 8 00:52:34.191164 kubelet[2057]: I0508 00:52:34.191105 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k457n\" (UniqueName: \"kubernetes.io/projected/a9bf23e9-64ea-441a-ac81-81de620871c1-kube-api-access-k457n\") pod \"calico-apiserver-5bd8f59f4b-ngzh4\" (UID: \"a9bf23e9-64ea-441a-ac81-81de620871c1\") " pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" May 8 00:52:34.191164 kubelet[2057]: I0508 00:52:34.191129 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vg6gz\" (UniqueName: \"kubernetes.io/projected/03263d58-45c7-4ef8-ad8f-306f81cb08d9-kube-api-access-vg6gz\") pod \"coredns-7db6d8ff4d-x9jqs\" (UID: \"03263d58-45c7-4ef8-ad8f-306f81cb08d9\") " pod="kube-system/coredns-7db6d8ff4d-x9jqs" May 8 00:52:34.191164 kubelet[2057]: I0508 00:52:34.191148 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wwvvs\" (UniqueName: \"kubernetes.io/projected/b02b9103-7c5d-4a1c-aab1-9c7de87e2acb-kube-api-access-wwvvs\") pod \"coredns-7db6d8ff4d-dblrj\" (UID: \"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb\") " pod="kube-system/coredns-7db6d8ff4d-dblrj" May 8 00:52:34.191247 kubelet[2057]: I0508 00:52:34.191167 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b02b9103-7c5d-4a1c-aab1-9c7de87e2acb-config-volume\") pod \"coredns-7db6d8ff4d-dblrj\" (UID: \"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb\") " pod="kube-system/coredns-7db6d8ff4d-dblrj" May 8 00:52:34.191247 kubelet[2057]: I0508 00:52:34.191186 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e4ca0235-7684-4362-b53c-97dd22ef8685-tigera-ca-bundle\") pod \"calico-kube-controllers-876857c46-494nx\" (UID: \"e4ca0235-7684-4362-b53c-97dd22ef8685\") " pod="calico-system/calico-kube-controllers-876857c46-494nx" May 8 00:52:34.191247 kubelet[2057]: I0508 00:52:34.191228 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a9bf23e9-64ea-441a-ac81-81de620871c1-calico-apiserver-certs\") pod \"calico-apiserver-5bd8f59f4b-ngzh4\" (UID: \"a9bf23e9-64ea-441a-ac81-81de620871c1\") " pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" May 8 00:52:34.191247 kubelet[2057]: I0508 00:52:34.191245 2057 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/03263d58-45c7-4ef8-ad8f-306f81cb08d9-config-volume\") pod \"coredns-7db6d8ff4d-x9jqs\" (UID: \"03263d58-45c7-4ef8-ad8f-306f81cb08d9\") " pod="kube-system/coredns-7db6d8ff4d-x9jqs" May 8 00:52:34.192837 systemd[1]: Created slice kubepods-besteffort-poda9bf23e9_64ea_441a_ac81_81de620871c1.slice. May 8 00:52:34.197101 env[1219]: time="2025-05-08T00:52:34.197066682Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:52:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2804 runtime=io.containerd.runc.v2\n" May 8 00:52:34.199452 systemd[1]: Created slice kubepods-besteffort-pod55c5af30_5df0_482a_8414_c894f1318ee7.slice. May 8 00:52:34.204575 systemd[1]: Created slice kubepods-besteffort-pode4ca0235_7684_4362_b53c_97dd22ef8685.slice. May 8 00:52:34.213957 systemd[1]: Created slice kubepods-burstable-pod03263d58_45c7_4ef8_ad8f_306f81cb08d9.slice. May 8 00:52:34.489362 kubelet[2057]: E0508 00:52:34.489309 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:34.489987 env[1219]: time="2025-05-08T00:52:34.489948897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-dblrj,Uid:b02b9103-7c5d-4a1c-aab1-9c7de87e2acb,Namespace:kube-system,Attempt:0,}" May 8 00:52:34.497303 env[1219]: time="2025-05-08T00:52:34.497261645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-ngzh4,Uid:a9bf23e9-64ea-441a-ac81-81de620871c1,Namespace:calico-apiserver,Attempt:0,}" May 8 00:52:34.508727 env[1219]: time="2025-05-08T00:52:34.508650278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-2flcf,Uid:55c5af30-5df0-482a-8414-c894f1318ee7,Namespace:calico-apiserver,Attempt:0,}" May 8 00:52:34.519476 env[1219]: time="2025-05-08T00:52:34.511585900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-876857c46-494nx,Uid:e4ca0235-7684-4362-b53c-97dd22ef8685,Namespace:calico-system,Attempt:0,}" May 8 00:52:34.519920 kubelet[2057]: E0508 00:52:34.519704 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:34.526182 env[1219]: time="2025-05-08T00:52:34.520187152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-x9jqs,Uid:03263d58-45c7-4ef8-ad8f-306f81cb08d9,Namespace:kube-system,Attempt:0,}" May 8 00:52:34.752559 env[1219]: time="2025-05-08T00:52:34.752426413Z" level=error msg="Failed to destroy network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.753188 env[1219]: time="2025-05-08T00:52:34.752824839Z" level=error msg="encountered an error cleaning up failed sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.753188 env[1219]: time="2025-05-08T00:52:34.752875213Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-876857c46-494nx,Uid:e4ca0235-7684-4362-b53c-97dd22ef8685,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.753287 kubelet[2057]: E0508 00:52:34.753138 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.753287 kubelet[2057]: E0508 00:52:34.753219 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-876857c46-494nx" May 8 00:52:34.754710 kubelet[2057]: E0508 00:52:34.754665 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-876857c46-494nx" May 8 00:52:34.754793 kubelet[2057]: E0508 00:52:34.754740 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-876857c46-494nx_calico-system(e4ca0235-7684-4362-b53c-97dd22ef8685)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-876857c46-494nx_calico-system(e4ca0235-7684-4362-b53c-97dd22ef8685)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-876857c46-494nx" podUID="e4ca0235-7684-4362-b53c-97dd22ef8685" May 8 00:52:34.759625 env[1219]: time="2025-05-08T00:52:34.756606807Z" level=error msg="Failed to destroy network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.759625 env[1219]: time="2025-05-08T00:52:34.756944537Z" level=error msg="encountered an error cleaning up failed sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.759625 env[1219]: time="2025-05-08T00:52:34.756993150Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-x9jqs,Uid:03263d58-45c7-4ef8-ad8f-306f81cb08d9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.759807 kubelet[2057]: E0508 00:52:34.758304 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.759807 kubelet[2057]: E0508 00:52:34.758359 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-x9jqs" May 8 00:52:34.759807 kubelet[2057]: E0508 00:52:34.758376 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-x9jqs" May 8 00:52:34.759908 kubelet[2057]: E0508 00:52:34.758427 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-x9jqs_kube-system(03263d58-45c7-4ef8-ad8f-306f81cb08d9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-x9jqs_kube-system(03263d58-45c7-4ef8-ad8f-306f81cb08d9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-x9jqs" podUID="03263d58-45c7-4ef8-ad8f-306f81cb08d9" May 8 00:52:34.771426 env[1219]: time="2025-05-08T00:52:34.771357096Z" level=error msg="Failed to destroy network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.772062 env[1219]: time="2025-05-08T00:52:34.772027074Z" level=error msg="encountered an error cleaning up failed sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.772711 env[1219]: time="2025-05-08T00:52:34.772674607Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-dblrj,Uid:b02b9103-7c5d-4a1c-aab1-9c7de87e2acb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.773315 kubelet[2057]: E0508 00:52:34.773072 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.773315 kubelet[2057]: E0508 00:52:34.773138 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-dblrj" May 8 00:52:34.773315 kubelet[2057]: E0508 00:52:34.773158 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-dblrj" May 8 00:52:34.773490 kubelet[2057]: E0508 00:52:34.773195 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-dblrj_kube-system(b02b9103-7c5d-4a1c-aab1-9c7de87e2acb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-dblrj_kube-system(b02b9103-7c5d-4a1c-aab1-9c7de87e2acb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-dblrj" podUID="b02b9103-7c5d-4a1c-aab1-9c7de87e2acb" May 8 00:52:34.780991 env[1219]: time="2025-05-08T00:52:34.780955212Z" level=error msg="Failed to destroy network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.781692 env[1219]: time="2025-05-08T00:52:34.781366042Z" level=error msg="encountered an error cleaning up failed sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.781692 env[1219]: time="2025-05-08T00:52:34.781450464Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-ngzh4,Uid:a9bf23e9-64ea-441a-ac81-81de620871c1,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.782943 kubelet[2057]: E0508 00:52:34.782688 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.782943 kubelet[2057]: E0508 00:52:34.782742 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" May 8 00:52:34.782943 kubelet[2057]: E0508 00:52:34.782761 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" May 8 00:52:34.783252 kubelet[2057]: E0508 00:52:34.782806 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5bd8f59f4b-ngzh4_calico-apiserver(a9bf23e9-64ea-441a-ac81-81de620871c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5bd8f59f4b-ngzh4_calico-apiserver(a9bf23e9-64ea-441a-ac81-81de620871c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" podUID="a9bf23e9-64ea-441a-ac81-81de620871c1" May 8 00:52:34.788057 env[1219]: time="2025-05-08T00:52:34.788013132Z" level=error msg="Failed to destroy network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.788625 env[1219]: time="2025-05-08T00:52:34.788589566Z" level=error msg="encountered an error cleaning up failed sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.788792 env[1219]: time="2025-05-08T00:52:34.788763772Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-2flcf,Uid:55c5af30-5df0-482a-8414-c894f1318ee7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.789093 kubelet[2057]: E0508 00:52:34.789055 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:34.789198 kubelet[2057]: E0508 00:52:34.789110 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" May 8 00:52:34.789198 kubelet[2057]: E0508 00:52:34.789128 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" May 8 00:52:34.789198 kubelet[2057]: E0508 00:52:34.789161 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5bd8f59f4b-2flcf_calico-apiserver(55c5af30-5df0-482a-8414-c894f1318ee7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5bd8f59f4b-2flcf_calico-apiserver(55c5af30-5df0-482a-8414-c894f1318ee7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" podUID="55c5af30-5df0-482a-8414-c894f1318ee7" May 8 00:52:35.023698 systemd[1]: Created slice kubepods-besteffort-podf79535ef_7f28_43da_af71_72d8363737d7.slice. May 8 00:52:35.026378 env[1219]: time="2025-05-08T00:52:35.026338541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k6ltj,Uid:f79535ef-7f28-43da-af71-72d8363737d7,Namespace:calico-system,Attempt:0,}" May 8 00:52:35.073002 env[1219]: time="2025-05-08T00:52:35.072943020Z" level=error msg="Failed to destroy network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.073337 env[1219]: time="2025-05-08T00:52:35.073293310Z" level=error msg="encountered an error cleaning up failed sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.073408 env[1219]: time="2025-05-08T00:52:35.073348884Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k6ltj,Uid:f79535ef-7f28-43da-af71-72d8363737d7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.073961 kubelet[2057]: E0508 00:52:35.073584 2057 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.073961 kubelet[2057]: E0508 00:52:35.073642 2057 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:35.073961 kubelet[2057]: E0508 00:52:35.073667 2057 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k6ltj" May 8 00:52:35.074105 kubelet[2057]: E0508 00:52:35.073707 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k6ltj_calico-system(f79535ef-7f28-43da-af71-72d8363737d7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k6ltj_calico-system(f79535ef-7f28-43da-af71-72d8363737d7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:35.099852 kubelet[2057]: I0508 00:52:35.098641 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:35.100209 env[1219]: time="2025-05-08T00:52:35.099513020Z" level=info msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" May 8 00:52:35.100255 kubelet[2057]: I0508 00:52:35.100077 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:35.101174 env[1219]: time="2025-05-08T00:52:35.101140079Z" level=info msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" May 8 00:52:35.103086 kubelet[2057]: I0508 00:52:35.102691 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:35.103181 env[1219]: time="2025-05-08T00:52:35.103128391Z" level=info msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" May 8 00:52:35.103867 kubelet[2057]: I0508 00:52:35.103550 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:35.103971 env[1219]: time="2025-05-08T00:52:35.103920115Z" level=info msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" May 8 00:52:35.104948 kubelet[2057]: I0508 00:52:35.104769 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:35.107258 env[1219]: time="2025-05-08T00:52:35.107217364Z" level=info msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" May 8 00:52:35.108868 kubelet[2057]: I0508 00:52:35.108050 2057 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:35.110529 env[1219]: time="2025-05-08T00:52:35.109576371Z" level=info msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" May 8 00:52:35.115695 kubelet[2057]: E0508 00:52:35.114683 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:35.117096 env[1219]: time="2025-05-08T00:52:35.117060978Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:52:35.146056 env[1219]: time="2025-05-08T00:52:35.145984905Z" level=error msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" failed" error="failed to destroy network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.146272 kubelet[2057]: E0508 00:52:35.146231 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:35.146330 kubelet[2057]: E0508 00:52:35.146283 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f"} May 8 00:52:35.146363 kubelet[2057]: E0508 00:52:35.146349 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"03263d58-45c7-4ef8-ad8f-306f81cb08d9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.146430 kubelet[2057]: E0508 00:52:35.146369 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"03263d58-45c7-4ef8-ad8f-306f81cb08d9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-x9jqs" podUID="03263d58-45c7-4ef8-ad8f-306f81cb08d9" May 8 00:52:35.164159 env[1219]: time="2025-05-08T00:52:35.164091606Z" level=error msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" failed" error="failed to destroy network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.164374 kubelet[2057]: E0508 00:52:35.164333 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:35.164446 kubelet[2057]: E0508 00:52:35.164383 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67"} May 8 00:52:35.164446 kubelet[2057]: E0508 00:52:35.164435 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.164526 kubelet[2057]: E0508 00:52:35.164463 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-dblrj" podUID="b02b9103-7c5d-4a1c-aab1-9c7de87e2acb" May 8 00:52:35.164900 env[1219]: time="2025-05-08T00:52:35.164853402Z" level=error msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" failed" error="failed to destroy network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.165092 kubelet[2057]: E0508 00:52:35.165058 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:35.165211 kubelet[2057]: E0508 00:52:35.165093 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb"} May 8 00:52:35.165211 kubelet[2057]: E0508 00:52:35.165119 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"55c5af30-5df0-482a-8414-c894f1318ee7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.165211 kubelet[2057]: E0508 00:52:35.165139 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"55c5af30-5df0-482a-8414-c894f1318ee7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" podUID="55c5af30-5df0-482a-8414-c894f1318ee7" May 8 00:52:35.169317 env[1219]: time="2025-05-08T00:52:35.169255896Z" level=error msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" failed" error="failed to destroy network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.169487 kubelet[2057]: E0508 00:52:35.169456 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:35.169536 kubelet[2057]: E0508 00:52:35.169493 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717"} May 8 00:52:35.169536 kubelet[2057]: E0508 00:52:35.169520 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f79535ef-7f28-43da-af71-72d8363737d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.169611 kubelet[2057]: E0508 00:52:35.169542 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f79535ef-7f28-43da-af71-72d8363737d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k6ltj" podUID="f79535ef-7f28-43da-af71-72d8363737d7" May 8 00:52:35.171689 env[1219]: time="2025-05-08T00:52:35.171637189Z" level=error msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" failed" error="failed to destroy network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.171844 kubelet[2057]: E0508 00:52:35.171804 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:35.171893 kubelet[2057]: E0508 00:52:35.171847 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275"} May 8 00:52:35.171893 kubelet[2057]: E0508 00:52:35.171874 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a9bf23e9-64ea-441a-ac81-81de620871c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.171985 kubelet[2057]: E0508 00:52:35.171892 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a9bf23e9-64ea-441a-ac81-81de620871c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" podUID="a9bf23e9-64ea-441a-ac81-81de620871c1" May 8 00:52:35.176787 env[1219]: time="2025-05-08T00:52:35.176726619Z" level=error msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" failed" error="failed to destroy network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:52:35.176999 kubelet[2057]: E0508 00:52:35.176952 2057 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:35.177052 kubelet[2057]: E0508 00:52:35.177001 2057 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0"} May 8 00:52:35.177052 kubelet[2057]: E0508 00:52:35.177036 2057 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e4ca0235-7684-4362-b53c-97dd22ef8685\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:52:35.177127 kubelet[2057]: E0508 00:52:35.177055 2057 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e4ca0235-7684-4362-b53c-97dd22ef8685\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-876857c46-494nx" podUID="e4ca0235-7684-4362-b53c-97dd22ef8685" May 8 00:52:35.419607 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f-shm.mount: Deactivated successfully. May 8 00:52:35.419692 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb-shm.mount: Deactivated successfully. May 8 00:52:35.419743 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275-shm.mount: Deactivated successfully. May 8 00:52:35.419802 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67-shm.mount: Deactivated successfully. May 8 00:52:35.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:37764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:35.960752 systemd[1]: Started sshd@8-10.0.0.127:22-10.0.0.1:37764.service. May 8 00:52:35.964412 kernel: audit: type=1130 audit(1746665555.960:1021): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:37764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:36.011000 audit[3194]: USER_ACCT pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.012073 sshd[3194]: Accepted publickey for core from 10.0.0.1 port 37764 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:36.015969 sshd[3194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:36.014000 audit[3194]: CRED_ACQ pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.021380 kernel: audit: type=1101 audit(1746665556.011:1022): pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.021462 kernel: audit: type=1103 audit(1746665556.014:1023): pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.021485 kernel: audit: type=1006 audit(1746665556.015:1024): pid=3194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 8 00:52:36.021039 systemd[1]: Started session-9.scope. May 8 00:52:36.022030 systemd-logind[1205]: New session 9 of user core. May 8 00:52:36.015000 audit[3194]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1b1f630 a2=3 a3=1 items=0 ppid=1 pid=3194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:36.026411 kernel: audit: type=1300 audit(1746665556.015:1024): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1b1f630 a2=3 a3=1 items=0 ppid=1 pid=3194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:36.026502 kernel: audit: type=1327 audit(1746665556.015:1024): proctitle=737368643A20636F7265205B707269765D May 8 00:52:36.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:36.025000 audit[3194]: USER_START pid=3194 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.030542 kernel: audit: type=1105 audit(1746665556.025:1025): pid=3194 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.030595 kernel: audit: type=1103 audit(1746665556.026:1026): pid=3196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.026000 audit[3196]: CRED_ACQ pid=3196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.148444 sshd[3194]: pam_unix(sshd:session): session closed for user core May 8 00:52:36.148000 audit[3194]: USER_END pid=3194 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.151719 systemd[1]: sshd@8-10.0.0.127:22-10.0.0.1:37764.service: Deactivated successfully. May 8 00:52:36.152474 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:52:36.153131 systemd-logind[1205]: Session 9 logged out. Waiting for processes to exit. May 8 00:52:36.153789 systemd-logind[1205]: Removed session 9. May 8 00:52:36.149000 audit[3194]: CRED_DISP pid=3194 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:36.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:37764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:36.156405 kernel: audit: type=1106 audit(1746665556.148:1027): pid=3194 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:40.197330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1309128942.mount: Deactivated successfully. May 8 00:52:40.405347 env[1219]: time="2025-05-08T00:52:40.405292031Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:40.406718 env[1219]: time="2025-05-08T00:52:40.406690700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:40.408265 env[1219]: time="2025-05-08T00:52:40.408223678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:40.409478 env[1219]: time="2025-05-08T00:52:40.409443547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:40.409875 env[1219]: time="2025-05-08T00:52:40.409841395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 8 00:52:40.427031 env[1219]: time="2025-05-08T00:52:40.426990217Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:52:40.441868 env[1219]: time="2025-05-08T00:52:40.441815407Z" level=info msg="CreateContainer within sandbox \"d683c3fdf7dbe11760f187e5a70451943a33306478fc6243521d08a122ed8f13\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"20ffa21facd9a1c2211b1c13b6f957d3529ce7c3e49c7170f6d2bf8f05385659\"" May 8 00:52:40.442573 env[1219]: time="2025-05-08T00:52:40.442544808Z" level=info msg="StartContainer for \"20ffa21facd9a1c2211b1c13b6f957d3529ce7c3e49c7170f6d2bf8f05385659\"" May 8 00:52:40.459312 systemd[1]: Started cri-containerd-20ffa21facd9a1c2211b1c13b6f957d3529ce7c3e49c7170f6d2bf8f05385659.scope. May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497695 kernel: kauditd_printk_skb: 2 callbacks suppressed May 8 00:52:40.497764 kernel: audit: type=1400 audit(1746665560.493:1030): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497799 kernel: audit: type=1300 audit(1746665560.493:1030): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2535 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:40.493000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2535 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:40.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230666661323166616364396131633232313162316331336236663935 May 8 00:52:40.504407 kernel: audit: type=1327 audit(1746665560.493:1030): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230666661323166616364396131633232313162316331336236663935 May 8 00:52:40.504471 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.509057 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.512169 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.512298 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.517031 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.517098 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.521820 kernel: audit: type=1400 audit(1746665560.493:1031): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit: BPF prog-id=139 op=LOAD May 8 00:52:40.493000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2535 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:40.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230666661323166616364396131633232313162316331336236663935 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.493000 audit: BPF prog-id=140 op=LOAD May 8 00:52:40.493000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2535 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:40.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230666661323166616364396131633232313162316331336236663935 May 8 00:52:40.497000 audit: BPF prog-id=140 op=UNLOAD May 8 00:52:40.497000 audit: BPF prog-id=139 op=UNLOAD May 8 00:52:40.497000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:40.497000 audit: BPF prog-id=141 op=LOAD May 8 00:52:40.497000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2535 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:40.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230666661323166616364396131633232313162316331336236663935 May 8 00:52:40.531075 env[1219]: time="2025-05-08T00:52:40.531024883Z" level=info msg="StartContainer for \"20ffa21facd9a1c2211b1c13b6f957d3529ce7c3e49c7170f6d2bf8f05385659\" returns successfully" May 8 00:52:40.698527 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:52:40.698627 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:52:41.130482 kubelet[2057]: E0508 00:52:41.130430 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:41.154119 systemd[1]: Started sshd@9-10.0.0.127:22-10.0.0.1:37776.service. May 8 00:52:41.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.127:22-10.0.0.1:37776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.198000 audit[3276]: USER_ACCT pid=3276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.200500 sshd[3276]: Accepted publickey for core from 10.0.0.1 port 37776 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:41.199000 audit[3276]: CRED_ACQ pid=3276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.199000 audit[3276]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec5aa630 a2=3 a3=1 items=0 ppid=1 pid=3276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:41.201754 sshd[3276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:41.204870 systemd-logind[1205]: New session 10 of user core. May 8 00:52:41.205843 systemd[1]: Started session-10.scope. May 8 00:52:41.208000 audit[3276]: USER_START pid=3276 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.209000 audit[3278]: CRED_ACQ pid=3278 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.327855 sshd[3276]: pam_unix(sshd:session): session closed for user core May 8 00:52:41.327000 audit[3276]: USER_END pid=3276 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.327000 audit[3276]: CRED_DISP pid=3276 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.330884 systemd[1]: sshd@9-10.0.0.127:22-10.0.0.1:37776.service: Deactivated successfully. May 8 00:52:41.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.127:22-10.0.0.1:37776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.331591 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:52:41.332082 systemd-logind[1205]: Session 10 logged out. Waiting for processes to exit. May 8 00:52:41.333240 systemd[1]: Started sshd@10-10.0.0.127:22-10.0.0.1:37784.service. May 8 00:52:41.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.127:22-10.0.0.1:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.333946 systemd-logind[1205]: Removed session 10. May 8 00:52:41.371000 audit[3290]: USER_ACCT pid=3290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.373302 sshd[3290]: Accepted publickey for core from 10.0.0.1 port 37784 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:41.372000 audit[3290]: CRED_ACQ pid=3290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.372000 audit[3290]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8e12f00 a2=3 a3=1 items=0 ppid=1 pid=3290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.372000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:41.374352 sshd[3290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:41.377507 systemd-logind[1205]: New session 11 of user core. May 8 00:52:41.378323 systemd[1]: Started session-11.scope. May 8 00:52:41.380000 audit[3290]: USER_START pid=3290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.381000 audit[3292]: CRED_ACQ pid=3292 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.536338 sshd[3290]: pam_unix(sshd:session): session closed for user core May 8 00:52:41.536000 audit[3290]: USER_END pid=3290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.536000 audit[3290]: CRED_DISP pid=3290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.127:22-10.0.0.1:37790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.541748 systemd[1]: Started sshd@11-10.0.0.127:22-10.0.0.1:37790.service. May 8 00:52:41.542261 systemd[1]: sshd@10-10.0.0.127:22-10.0.0.1:37784.service: Deactivated successfully. May 8 00:52:41.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.127:22-10.0.0.1:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.543019 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:52:41.546473 systemd-logind[1205]: Session 11 logged out. Waiting for processes to exit. May 8 00:52:41.547971 systemd-logind[1205]: Removed session 11. May 8 00:52:41.585000 audit[3301]: USER_ACCT pid=3301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.586919 sshd[3301]: Accepted publickey for core from 10.0.0.1 port 37790 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:41.586000 audit[3301]: CRED_ACQ pid=3301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.586000 audit[3301]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe074e740 a2=3 a3=1 items=0 ppid=1 pid=3301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:41.588528 sshd[3301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:41.592309 systemd-logind[1205]: New session 12 of user core. May 8 00:52:41.592684 systemd[1]: Started session-12.scope. May 8 00:52:41.594000 audit[3301]: USER_START pid=3301 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.595000 audit[3304]: CRED_ACQ pid=3304 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.714576 sshd[3301]: pam_unix(sshd:session): session closed for user core May 8 00:52:41.714000 audit[3301]: USER_END pid=3301 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.714000 audit[3301]: CRED_DISP pid=3301 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:41.717328 systemd[1]: sshd@11-10.0.0.127:22-10.0.0.1:37790.service: Deactivated successfully. May 8 00:52:41.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.127:22-10.0.0.1:37790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:41.718068 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:52:41.718618 systemd-logind[1205]: Session 12 logged out. Waiting for processes to exit. May 8 00:52:41.719300 systemd-logind[1205]: Removed session 12. May 8 00:52:41.942000 audit[3381]: AVC avc: denied { write } for pid=3381 comm="tee" name="fd" dev="proc" ino=18918 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.942000 audit[3381]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc527aa16 a2=241 a3=1b6 items=1 ppid=3323 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.942000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:52:41.942000 audit: PATH item=0 name="/dev/fd/63" inode=18911 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.942000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.948000 audit[3369]: AVC avc: denied { write } for pid=3369 comm="tee" name="fd" dev="proc" ino=18371 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.948000 audit[3369]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff718aa27 a2=241 a3=1b6 items=1 ppid=3331 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.948000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:52:41.948000 audit: PATH item=0 name="/dev/fd/63" inode=19915 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.948000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.956000 audit[3385]: AVC avc: denied { write } for pid=3385 comm="tee" name="fd" dev="proc" ino=20710 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.956000 audit[3385]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa5f5a26 a2=241 a3=1b6 items=1 ppid=3324 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.956000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:52:41.956000 audit: PATH item=0 name="/dev/fd/63" inode=20700 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.956000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.957000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=18377 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.957000 audit[3399]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5684a26 a2=241 a3=1b6 items=1 ppid=3334 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.957000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:52:41.957000 audit: PATH item=0 name="/dev/fd/63" inode=20707 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.957000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.968000 audit[3394]: AVC avc: denied { write } for pid=3394 comm="tee" name="fd" dev="proc" ino=18381 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.968000 audit[3394]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd2fba17 a2=241 a3=1b6 items=1 ppid=3327 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.968000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:52:41.968000 audit: PATH item=0 name="/dev/fd/63" inode=19923 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.968000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.971000 audit[3392]: AVC avc: denied { write } for pid=3392 comm="tee" name="fd" dev="proc" ino=19926 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.971000 audit[3392]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff64c2a28 a2=241 a3=1b6 items=1 ppid=3322 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.971000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:52:41.971000 audit: PATH item=0 name="/dev/fd/63" inode=19922 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.971000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:41.976000 audit[3397]: AVC avc: denied { write } for pid=3397 comm="tee" name="fd" dev="proc" ino=20714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:52:41.976000 audit[3397]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7a67a26 a2=241 a3=1b6 items=1 ppid=3330 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:41.976000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:52:41.976000 audit: PATH item=0 name="/dev/fd/63" inode=20706 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:52:41.976000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit: BPF prog-id=142 op=LOAD May 8 00:52:42.081000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeceed698 a2=98 a3=ffffeceed688 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.081000 audit: BPF prog-id=142 op=UNLOAD May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit: BPF prog-id=143 op=LOAD May 8 00:52:42.081000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeceed328 a2=74 a3=95 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.081000 audit: BPF prog-id=143 op=UNLOAD May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.081000 audit: BPF prog-id=144 op=LOAD May 8 00:52:42.081000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeceed388 a2=94 a3=2 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.082000 audit: BPF prog-id=144 op=UNLOAD May 8 00:52:42.132268 kubelet[2057]: I0508 00:52:42.131270 2057 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:52:42.132268 kubelet[2057]: E0508 00:52:42.131991 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:42.174000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.174000 audit: BPF prog-id=145 op=LOAD May 8 00:52:42.174000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeceed348 a2=40 a3=ffffeceed378 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.174000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.175000 audit: BPF prog-id=145 op=UNLOAD May 8 00:52:42.175000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.175000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeceed460 a2=50 a3=0 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.175000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed3b8 a2=28 a3=ffffeceed4e8 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeceed3e8 a2=28 a3=ffffeceed518 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeceed298 a2=28 a3=ffffeceed3c8 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed408 a2=28 a3=ffffeceed538 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed3e8 a2=28 a3=ffffeceed518 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed3d8 a2=28 a3=ffffeceed508 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed408 a2=28 a3=ffffeceed538 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeceed3e8 a2=28 a3=ffffeceed518 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeceed408 a2=28 a3=ffffeceed538 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeceed3d8 a2=28 a3=ffffeceed508 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.183000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.183000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeceed458 a2=28 a3=ffffeceed598 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.183000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeceed190 a2=50 a3=0 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit: BPF prog-id=146 op=LOAD May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeceed198 a2=94 a3=5 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit: BPF prog-id=146 op=UNLOAD May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeceed2a0 a2=50 a3=0 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeceed3e8 a2=4 a3=3 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeceed3c8 a2=94 a3=6 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeceecb98 a2=94 a3=83 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.184000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.184000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeceecb98 a2=94 a3=83 items=0 ppid=3328 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:52:42.196000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.196000 audit: BPF prog-id=147 op=LOAD May 8 00:52:42.196000 audit[3450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc34e098 a2=98 a3=ffffcc34e088 items=0 ppid=3328 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.196000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:42.197000 audit: BPF prog-id=147 op=UNLOAD May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit: BPF prog-id=148 op=LOAD May 8 00:52:42.197000 audit[3450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc34df48 a2=74 a3=95 items=0 ppid=3328 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.197000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:42.197000 audit: BPF prog-id=148 op=UNLOAD May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.197000 audit: BPF prog-id=149 op=LOAD May 8 00:52:42.197000 audit[3450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc34df78 a2=40 a3=ffffcc34dfa8 items=0 ppid=3328 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.197000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:52:42.197000 audit: BPF prog-id=149 op=UNLOAD May 8 00:52:42.244313 systemd-networkd[1043]: vxlan.calico: Link UP May 8 00:52:42.244319 systemd-networkd[1043]: vxlan.calico: Gained carrier May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit: BPF prog-id=150 op=LOAD May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf6d3f68 a2=98 a3=ffffcf6d3f58 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit: BPF prog-id=150 op=UNLOAD May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit: BPF prog-id=151 op=LOAD May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf6d3c48 a2=74 a3=95 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit: BPF prog-id=151 op=UNLOAD May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit: BPF prog-id=152 op=LOAD May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf6d3ca8 a2=94 a3=2 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit: BPF prog-id=152 op=UNLOAD May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3cd8 a2=28 a3=ffffcf6d3e08 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf6d3d08 a2=28 a3=ffffcf6d3e38 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf6d3bb8 a2=28 a3=ffffcf6d3ce8 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3d28 a2=28 a3=ffffcf6d3e58 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3d08 a2=28 a3=ffffcf6d3e38 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3cf8 a2=28 a3=ffffcf6d3e28 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3d28 a2=28 a3=ffffcf6d3e58 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf6d3d08 a2=28 a3=ffffcf6d3e38 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf6d3d28 a2=28 a3=ffffcf6d3e58 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf6d3cf8 a2=28 a3=ffffcf6d3e28 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcf6d3d78 a2=28 a3=ffffcf6d3eb8 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.269000 audit: BPF prog-id=153 op=LOAD May 8 00:52:42.269000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcf6d3b98 a2=40 a3=ffffcf6d3bc8 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.270000 audit: BPF prog-id=153 op=UNLOAD May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcf6d3bc0 a2=50 a3=0 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcf6d3bc0 a2=50 a3=0 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit: BPF prog-id=154 op=LOAD May 8 00:52:42.270000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcf6d3328 a2=94 a3=2 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.270000 audit: BPF prog-id=154 op=UNLOAD May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.270000 audit: BPF prog-id=155 op=LOAD May 8 00:52:42.270000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcf6d34b8 a2=94 a3=30 items=0 ppid=3328 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit: BPF prog-id=156 op=LOAD May 8 00:52:42.278000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2a80a78 a2=98 a3=ffffc2a80a68 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.278000 audit: BPF prog-id=156 op=UNLOAD May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit: BPF prog-id=157 op=LOAD May 8 00:52:42.278000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2a80708 a2=74 a3=95 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.278000 audit: BPF prog-id=157 op=UNLOAD May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.278000 audit: BPF prog-id=158 op=LOAD May 8 00:52:42.278000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2a80768 a2=94 a3=2 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.279000 audit: BPF prog-id=158 op=UNLOAD May 8 00:52:42.363000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit: BPF prog-id=159 op=LOAD May 8 00:52:42.363000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2a80728 a2=40 a3=ffffc2a80758 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.363000 audit: BPF prog-id=159 op=UNLOAD May 8 00:52:42.363000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.363000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc2a80840 a2=50 a3=0 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a80798 a2=28 a3=ffffc2a808c8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2a807c8 a2=28 a3=ffffc2a808f8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2a80678 a2=28 a3=ffffc2a807a8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a807e8 a2=28 a3=ffffc2a80918 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a807c8 a2=28 a3=ffffc2a808f8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a807b8 a2=28 a3=ffffc2a808e8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a807e8 a2=28 a3=ffffc2a80918 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2a807c8 a2=28 a3=ffffc2a808f8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2a807e8 a2=28 a3=ffffc2a80918 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2a807b8 a2=28 a3=ffffc2a808e8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2a80838 a2=28 a3=ffffc2a80978 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2a80570 a2=50 a3=0 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit: BPF prog-id=160 op=LOAD May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc2a80578 a2=94 a3=5 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit: BPF prog-id=160 op=UNLOAD May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2a80680 a2=50 a3=0 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc2a807c8 a2=4 a3=3 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.372000 audit[3486]: AVC avc: denied { confidentiality } for pid=3486 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.372000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2a807a8 a2=94 a3=6 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { confidentiality } for pid=3486 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.373000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2a7ff78 a2=94 a3=83 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { confidentiality } for pid=3486 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:52:42.373000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2a7ff78 a2=94 a3=83 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc2a819b8 a2=10 a3=ffffc2a81aa8 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.373000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.373000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc2a81878 a2=10 a3=ffffc2a81968 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.374000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.374000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc2a817e8 a2=10 a3=ffffc2a81968 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.374000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:42.374000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc2a817e8 a2=10 a3=ffffc2a81968 items=0 ppid=3328 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:52:42.388000 audit: BPF prog-id=155 op=UNLOAD May 8 00:52:42.432000 audit[3508]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:42.432000 audit[3508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd0378e00 a2=0 a3=ffff9a7eefa8 items=0 ppid=3328 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:42.441000 audit[3511]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:42.441000 audit[3511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd34d2dc0 a2=0 a3=ffffb224bfa8 items=0 ppid=3328 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.441000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:42.442000 audit[3510]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:42.442000 audit[3510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffeb996470 a2=0 a3=ffffbed67fa8 items=0 ppid=3328 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.442000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:42.447000 audit[3513]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:42.447000 audit[3513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe5119e80 a2=0 a3=ffffa912afa8 items=0 ppid=3328 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:42.447000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:43.347069 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL May 8 00:52:46.720120 systemd[1]: Started sshd@12-10.0.0.127:22-10.0.0.1:46652.service. May 8 00:52:46.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:46.721087 kernel: kauditd_printk_skb: 581 callbacks suppressed May 8 00:52:46.721151 kernel: audit: type=1130 audit(1746665566.718:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:46.773000 audit[3528]: USER_ACCT pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.775248 sshd[3528]: Accepted publickey for core from 10.0.0.1 port 46652 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:46.776783 sshd[3528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:46.774000 audit[3528]: CRED_ACQ pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.782152 kernel: audit: type=1101 audit(1746665566.773:1166): pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.782209 kernel: audit: type=1103 audit(1746665566.774:1167): pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.782226 kernel: audit: type=1006 audit(1746665566.774:1168): pid=3528 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 8 00:52:46.782609 systemd-logind[1205]: New session 13 of user core. May 8 00:52:46.782994 systemd[1]: Started session-13.scope. May 8 00:52:46.774000 audit[3528]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe52593b0 a2=3 a3=1 items=0 ppid=1 pid=3528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:46.786525 kernel: audit: type=1300 audit(1746665566.774:1168): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe52593b0 a2=3 a3=1 items=0 ppid=1 pid=3528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:46.786575 kernel: audit: type=1327 audit(1746665566.774:1168): proctitle=737368643A20636F7265205B707269765D May 8 00:52:46.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:46.788426 kernel: audit: type=1105 audit(1746665566.785:1169): pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.785000 audit[3528]: USER_START pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.786000 audit[3530]: CRED_ACQ pid=3530 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.794084 kernel: audit: type=1103 audit(1746665566.786:1170): pid=3530 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.951676 sshd[3528]: pam_unix(sshd:session): session closed for user core May 8 00:52:46.951000 audit[3528]: USER_END pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.955091 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:52:46.955466 systemd-logind[1205]: Session 13 logged out. Waiting for processes to exit. May 8 00:52:46.955700 systemd[1]: sshd@12-10.0.0.127:22-10.0.0.1:46652.service: Deactivated successfully. May 8 00:52:46.952000 audit[3528]: CRED_DISP pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.956838 systemd-logind[1205]: Removed session 13. May 8 00:52:46.959792 kernel: audit: type=1106 audit(1746665566.951:1171): pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.959865 kernel: audit: type=1104 audit(1746665566.952:1172): pid=3528 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:46.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:47.020496 env[1219]: time="2025-05-08T00:52:47.020300382Z" level=info msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" May 8 00:52:47.020832 env[1219]: time="2025-05-08T00:52:47.020331588Z" level=info msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" May 8 00:52:47.183784 kubelet[2057]: I0508 00:52:47.182744 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bb4t4" podStartSLOduration=7.923989925 podStartE2EDuration="21.182721927s" podCreationTimestamp="2025-05-08 00:52:26 +0000 UTC" firstStartedPulling="2025-05-08 00:52:27.151814588 +0000 UTC m=+25.252571808" lastFinishedPulling="2025-05-08 00:52:40.41054659 +0000 UTC m=+38.511303810" observedRunningTime="2025-05-08 00:52:41.144267552 +0000 UTC m=+39.245024772" watchObservedRunningTime="2025-05-08 00:52:47.182721927 +0000 UTC m=+45.283479147" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.181 [INFO][3576] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.182 [INFO][3576] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" iface="eth0" netns="/var/run/netns/cni-a9be4998-c2db-d1cc-d5f5-aa47775f1e4f" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.182 [INFO][3576] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" iface="eth0" netns="/var/run/netns/cni-a9be4998-c2db-d1cc-d5f5-aa47775f1e4f" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.186 [INFO][3576] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" iface="eth0" netns="/var/run/netns/cni-a9be4998-c2db-d1cc-d5f5-aa47775f1e4f" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.186 [INFO][3576] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.186 [INFO][3576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.294 [INFO][3592] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.294 [INFO][3592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.295 [INFO][3592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.307 [WARNING][3592] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.307 [INFO][3592] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.308 [INFO][3592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:47.317814 env[1219]: 2025-05-08 00:52:47.315 [INFO][3576] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:52:47.318675 env[1219]: time="2025-05-08T00:52:47.318625276Z" level=info msg="TearDown network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" successfully" May 8 00:52:47.318774 env[1219]: time="2025-05-08T00:52:47.318756020Z" level=info msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" returns successfully" May 8 00:52:47.319857 kubelet[2057]: E0508 00:52:47.319831 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:47.320380 systemd[1]: run-netns-cni\x2da9be4998\x2dc2db\x2dd1cc\x2dd5f5\x2daa47775f1e4f.mount: Deactivated successfully. May 8 00:52:47.323081 env[1219]: time="2025-05-08T00:52:47.323049496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-dblrj,Uid:b02b9103-7c5d-4a1c-aab1-9c7de87e2acb,Namespace:kube-system,Attempt:1,}" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.182 [INFO][3575] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.183 [INFO][3575] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" iface="eth0" netns="/var/run/netns/cni-f2a79b8a-ee36-ffc2-ccdc-acbf6eea94e4" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.183 [INFO][3575] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" iface="eth0" netns="/var/run/netns/cni-f2a79b8a-ee36-ffc2-ccdc-acbf6eea94e4" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.186 [INFO][3575] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" iface="eth0" netns="/var/run/netns/cni-f2a79b8a-ee36-ffc2-ccdc-acbf6eea94e4" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.186 [INFO][3575] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.186 [INFO][3575] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.300 [INFO][3594] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.300 [INFO][3594] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.308 [INFO][3594] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.315 [WARNING][3594] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.316 [INFO][3594] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.317 [INFO][3594] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:47.326463 env[1219]: 2025-05-08 00:52:47.324 [INFO][3575] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:52:47.327028 env[1219]: time="2025-05-08T00:52:47.327001068Z" level=info msg="TearDown network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" successfully" May 8 00:52:47.327106 env[1219]: time="2025-05-08T00:52:47.327089725Z" level=info msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" returns successfully" May 8 00:52:47.327838 env[1219]: time="2025-05-08T00:52:47.327801777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-876857c46-494nx,Uid:e4ca0235-7684-4362-b53c-97dd22ef8685,Namespace:calico-system,Attempt:1,}" May 8 00:52:47.328829 systemd[1]: run-netns-cni\x2df2a79b8a\x2dee36\x2dffc2\x2dccdc\x2dacbf6eea94e4.mount: Deactivated successfully. May 8 00:52:47.540212 systemd-networkd[1043]: cali2d14889fb6d: Link UP May 8 00:52:47.542704 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:52:47.542914 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d14889fb6d: link becomes ready May 8 00:52:47.542742 systemd-networkd[1043]: cali2d14889fb6d: Gained carrier May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.458 [INFO][3613] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0 coredns-7db6d8ff4d- kube-system b02b9103-7c5d-4a1c-aab1-9c7de87e2acb 929 0 2025-05-08 00:52:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-dblrj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2d14889fb6d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.458 [INFO][3613] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.495 [INFO][3643] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" HandleID="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.510 [INFO][3643] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" HandleID="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8de0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-dblrj", "timestamp":"2025-05-08 00:52:47.495062258 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.510 [INFO][3643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.511 [INFO][3643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.511 [INFO][3643] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.512 [INFO][3643] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.516 [INFO][3643] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.520 [INFO][3643] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.521 [INFO][3643] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.523 [INFO][3643] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.523 [INFO][3643] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.524 [INFO][3643] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369 May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.527 [INFO][3643] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.531 [INFO][3643] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.531 [INFO][3643] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" host="localhost" May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.531 [INFO][3643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:47.559812 env[1219]: 2025-05-08 00:52:47.532 [INFO][3643] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" HandleID="k8s-pod-network.b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.535 [INFO][3613] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-dblrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2d14889fb6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.535 [INFO][3613] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.535 [INFO][3613] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d14889fb6d ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.544 [INFO][3613] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.545 [INFO][3613] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369", Pod:"coredns-7db6d8ff4d-dblrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2d14889fb6d", MAC:"9e:db:c0:fc:27:ce", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:47.561175 env[1219]: 2025-05-08 00:52:47.556 [INFO][3613] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369" Namespace="kube-system" Pod="coredns-7db6d8ff4d-dblrj" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:52:47.566906 systemd-networkd[1043]: calid80410c7d76: Link UP May 8 00:52:47.568493 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid80410c7d76: link becomes ready May 8 00:52:47.567000 audit[3676]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3676 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:47.567000 audit[3676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffed518160 a2=0 a3=ffffa6c7afa8 items=0 ppid=3328 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:47.568493 systemd-networkd[1043]: calid80410c7d76: Gained carrier May 8 00:52:47.576211 env[1219]: time="2025-05-08T00:52:47.576132724Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:47.576211 env[1219]: time="2025-05-08T00:52:47.576176772Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:47.576211 env[1219]: time="2025-05-08T00:52:47.576186934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:47.581216 env[1219]: time="2025-05-08T00:52:47.581157935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369 pid=3685 runtime=io.containerd.runc.v2 May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.460 [INFO][3607] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0 calico-kube-controllers-876857c46- calico-system e4ca0235-7684-4362-b53c-97dd22ef8685 928 0 2025-05-08 00:52:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:876857c46 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-876857c46-494nx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid80410c7d76 [] []}} ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.460 [INFO][3607] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.495 [INFO][3649] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" HandleID="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.511 [INFO][3649] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" HandleID="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000368c30), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-876857c46-494nx", "timestamp":"2025-05-08 00:52:47.495078301 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.511 [INFO][3649] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.532 [INFO][3649] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.532 [INFO][3649] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.533 [INFO][3649] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.537 [INFO][3649] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.543 [INFO][3649] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.544 [INFO][3649] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.546 [INFO][3649] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.546 [INFO][3649] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.549 [INFO][3649] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.553 [INFO][3649] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.560 [INFO][3649] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.560 [INFO][3649] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" host="localhost" May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.560 [INFO][3649] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:47.586847 env[1219]: 2025-05-08 00:52:47.560 [INFO][3649] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" HandleID="k8s-pod-network.eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.565 [INFO][3607] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0", GenerateName:"calico-kube-controllers-876857c46-", Namespace:"calico-system", SelfLink:"", UID:"e4ca0235-7684-4362-b53c-97dd22ef8685", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"876857c46", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-876857c46-494nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid80410c7d76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.565 [INFO][3607] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.565 [INFO][3607] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid80410c7d76 ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.575 [INFO][3607] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.575 [INFO][3607] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0", GenerateName:"calico-kube-controllers-876857c46-", Namespace:"calico-system", SelfLink:"", UID:"e4ca0235-7684-4362-b53c-97dd22ef8685", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"876857c46", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a", Pod:"calico-kube-controllers-876857c46-494nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid80410c7d76", MAC:"b2:49:f4:75:40:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:47.587354 env[1219]: 2025-05-08 00:52:47.583 [INFO][3607] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a" Namespace="calico-system" Pod="calico-kube-controllers-876857c46-494nx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:52:47.595272 systemd[1]: Started cri-containerd-b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369.scope. May 8 00:52:47.596000 audit[3717]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:47.596000 audit[3717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffde4182b0 a2=0 a3=ffff9ab95fa8 items=0 ppid=3328 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:47.602403 env[1219]: time="2025-05-08T00:52:47.602322498Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:47.602486 env[1219]: time="2025-05-08T00:52:47.602408874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:47.602486 env[1219]: time="2025-05-08T00:52:47.602436759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:47.602670 env[1219]: time="2025-05-08T00:52:47.602622954Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a pid=3724 runtime=io.containerd.runc.v2 May 8 00:52:47.614630 systemd[1]: Started cri-containerd-eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a.scope. May 8 00:52:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit: BPF prog-id=161 op=LOAD May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234626533633864623439643462643066633239636263653362623435 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234626533633864623439643462643066633239636263653362623435 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit: BPF prog-id=162 op=LOAD May 8 00:52:47.617000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234626533633864623439643462643066633239636263653362623435 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit: BPF prog-id=163 op=LOAD May 8 00:52:47.617000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234626533633864623439643462643066633239636263653362623435 May 8 00:52:47.617000 audit: BPF prog-id=163 op=UNLOAD May 8 00:52:47.617000 audit: BPF prog-id=162 op=UNLOAD May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.617000 audit: BPF prog-id=164 op=LOAD May 8 00:52:47.617000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234626533633864623439643462643066633239636263653362623435 May 8 00:52:47.620016 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.635000 audit: BPF prog-id=165 op=LOAD May 8 00:52:47.637718 env[1219]: time="2025-05-08T00:52:47.637676131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-dblrj,Uid:b02b9103-7c5d-4a1c-aab1-9c7de87e2acb,Namespace:kube-system,Attempt:1,} returns sandbox id \"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369\"" May 8 00:52:47.636000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.636000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3724 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313030323863363931643939356233613237376235386665643762 May 8 00:52:47.636000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.636000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3724 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313030323863363931643939356233613237376235386665643762 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit: BPF prog-id=166 op=LOAD May 8 00:52:47.637000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3724 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313030323863363931643939356233613237376235386665643762 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit: BPF prog-id=167 op=LOAD May 8 00:52:47.637000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3724 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313030323863363931643939356233613237376235386665643762 May 8 00:52:47.637000 audit: BPF prog-id=167 op=UNLOAD May 8 00:52:47.637000 audit: BPF prog-id=166 op=UNLOAD May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.637000 audit: BPF prog-id=168 op=LOAD May 8 00:52:47.637000 audit[3739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3724 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313030323863363931643939356233613237376235386665643762 May 8 00:52:47.639548 kubelet[2057]: E0508 00:52:47.638416 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:47.641265 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:47.641688 env[1219]: time="2025-05-08T00:52:47.641620622Z" level=info msg="CreateContainer within sandbox \"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:52:47.655440 env[1219]: time="2025-05-08T00:52:47.655400056Z" level=info msg="CreateContainer within sandbox \"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f388eab737e8353dd1afbfe900fe50df69ae1f22a9dad9659e3046bb0158d3b0\"" May 8 00:52:47.656892 env[1219]: time="2025-05-08T00:52:47.655806851Z" level=info msg="StartContainer for \"f388eab737e8353dd1afbfe900fe50df69ae1f22a9dad9659e3046bb0158d3b0\"" May 8 00:52:47.663088 env[1219]: time="2025-05-08T00:52:47.663053834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-876857c46-494nx,Uid:e4ca0235-7684-4362-b53c-97dd22ef8685,Namespace:calico-system,Attempt:1,} returns sandbox id \"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a\"" May 8 00:52:47.664663 env[1219]: time="2025-05-08T00:52:47.664630606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:52:47.701741 systemd[1]: Started cri-containerd-f388eab737e8353dd1afbfe900fe50df69ae1f22a9dad9659e3046bb0158d3b0.scope. May 8 00:52:47.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.720000 audit: BPF prog-id=169 op=LOAD May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3685 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383865616237333765383335336464316166626665393030666535 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3685 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383865616237333765383335336464316166626665393030666535 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.721000 audit: BPF prog-id=170 op=LOAD May 8 00:52:47.721000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3685 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383865616237333765383335336464316166626665393030666535 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit: BPF prog-id=171 op=LOAD May 8 00:52:47.722000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3685 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383865616237333765383335336464316166626665393030666535 May 8 00:52:47.722000 audit: BPF prog-id=171 op=UNLOAD May 8 00:52:47.722000 audit: BPF prog-id=170 op=UNLOAD May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:47.722000 audit: BPF prog-id=172 op=LOAD May 8 00:52:47.722000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3685 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:47.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383865616237333765383335336464316166626665393030666535 May 8 00:52:47.737834 env[1219]: time="2025-05-08T00:52:47.737797368Z" level=info msg="StartContainer for \"f388eab737e8353dd1afbfe900fe50df69ae1f22a9dad9659e3046bb0158d3b0\" returns successfully" May 8 00:52:48.021224 env[1219]: time="2025-05-08T00:52:48.020455602Z" level=info msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.065 [INFO][3828] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.066 [INFO][3828] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" iface="eth0" netns="/var/run/netns/cni-1cc0376b-7729-f30b-f858-38208eec3177" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.066 [INFO][3828] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" iface="eth0" netns="/var/run/netns/cni-1cc0376b-7729-f30b-f858-38208eec3177" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.066 [INFO][3828] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" iface="eth0" netns="/var/run/netns/cni-1cc0376b-7729-f30b-f858-38208eec3177" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.066 [INFO][3828] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.066 [INFO][3828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.085 [INFO][3837] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.085 [INFO][3837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.085 [INFO][3837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.093 [WARNING][3837] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.093 [INFO][3837] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.094 [INFO][3837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:48.098599 env[1219]: 2025-05-08 00:52:48.096 [INFO][3828] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:52:48.099384 env[1219]: time="2025-05-08T00:52:48.098715646Z" level=info msg="TearDown network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" successfully" May 8 00:52:48.099384 env[1219]: time="2025-05-08T00:52:48.098745771Z" level=info msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" returns successfully" May 8 00:52:48.099525 env[1219]: time="2025-05-08T00:52:48.099493467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-ngzh4,Uid:a9bf23e9-64ea-441a-ac81-81de620871c1,Namespace:calico-apiserver,Attempt:1,}" May 8 00:52:48.147669 kubelet[2057]: E0508 00:52:48.147636 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:48.157158 kubelet[2057]: I0508 00:52:48.156981 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-dblrj" podStartSLOduration=29.156962457 podStartE2EDuration="29.156962457s" podCreationTimestamp="2025-05-08 00:52:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:48.155074315 +0000 UTC m=+46.255831535" watchObservedRunningTime="2025-05-08 00:52:48.156962457 +0000 UTC m=+46.257719677" May 8 00:52:48.203000 audit[3867]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.203000 audit[3867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc660c000 a2=0 a3=1 items=0 ppid=2220 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.209000 audit[3867]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.209000 audit[3867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc660c000 a2=0 a3=1 items=0 ppid=2220 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.227000 audit[3870]: NETFILTER_CFG table=filter:105 family=2 entries=10 op=nft_register_rule pid=3870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.227000 audit[3870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff7e8e0d0 a2=0 a3=1 items=0 ppid=2220 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.234407 systemd-networkd[1043]: cali4fe8db82e28: Link UP May 8 00:52:48.232000 audit[3870]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:48.232000 audit[3870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff7e8e0d0 a2=0 a3=1 items=0 ppid=2220 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:48.235764 systemd-networkd[1043]: cali4fe8db82e28: Gained carrier May 8 00:52:48.236458 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fe8db82e28: link becomes ready May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.147 [INFO][3845] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0 calico-apiserver-5bd8f59f4b- calico-apiserver a9bf23e9-64ea-441a-ac81-81de620871c1 943 0 2025-05-08 00:52:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bd8f59f4b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5bd8f59f4b-ngzh4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4fe8db82e28 [] []}} ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.148 [INFO][3845] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.195 [INFO][3858] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" HandleID="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.206 [INFO][3858] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" HandleID="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000613e00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5bd8f59f4b-ngzh4", "timestamp":"2025-05-08 00:52:48.195366747 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.206 [INFO][3858] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.206 [INFO][3858] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.206 [INFO][3858] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.208 [INFO][3858] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.213 [INFO][3858] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.217 [INFO][3858] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.218 [INFO][3858] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.220 [INFO][3858] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.220 [INFO][3858] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.221 [INFO][3858] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848 May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.224 [INFO][3858] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.229 [INFO][3858] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.230 [INFO][3858] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" host="localhost" May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.230 [INFO][3858] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:48.249585 env[1219]: 2025-05-08 00:52:48.230 [INFO][3858] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" HandleID="k8s-pod-network.5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.232 [INFO][3845] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a9bf23e9-64ea-441a-ac81-81de620871c1", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5bd8f59f4b-ngzh4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fe8db82e28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.232 [INFO][3845] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.232 [INFO][3845] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4fe8db82e28 ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.234 [INFO][3845] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.237 [INFO][3845] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a9bf23e9-64ea-441a-ac81-81de620871c1", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848", Pod:"calico-apiserver-5bd8f59f4b-ngzh4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fe8db82e28", MAC:"7e:01:f1:52:2e:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:48.250179 env[1219]: 2025-05-08 00:52:48.247 [INFO][3845] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-ngzh4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:52:48.259000 audit[3887]: NETFILTER_CFG table=filter:107 family=2 entries=48 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:48.259000 audit[3887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25868 a0=3 a1=ffffd72b5f90 a2=0 a3=ffff84cc6fa8 items=0 ppid=3328 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.259000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:48.261831 env[1219]: time="2025-05-08T00:52:48.261743754Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:48.261831 env[1219]: time="2025-05-08T00:52:48.261795004Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:48.261831 env[1219]: time="2025-05-08T00:52:48.261805325Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:48.262545 env[1219]: time="2025-05-08T00:52:48.262507973Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848 pid=3894 runtime=io.containerd.runc.v2 May 8 00:52:48.273150 systemd[1]: Started cri-containerd-5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848.scope. May 8 00:52:48.323008 systemd[1]: run-netns-cni\x2d1cc0376b\x2d7729\x2df30b\x2df858\x2d38208eec3177.mount: Deactivated successfully. May 8 00:52:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit: BPF prog-id=173 op=LOAD May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323365333935366331316134663335386533396462386432616436 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323365333935366331316134663335386533396462386432616436 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit: BPF prog-id=174 op=LOAD May 8 00:52:48.324000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323365333935366331316134663335386533396462386432616436 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit: BPF prog-id=175 op=LOAD May 8 00:52:48.324000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323365333935366331316134663335386533396462386432616436 May 8 00:52:48.324000 audit: BPF prog-id=175 op=UNLOAD May 8 00:52:48.324000 audit: BPF prog-id=174 op=UNLOAD May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:48.324000 audit: BPF prog-id=176 op=LOAD May 8 00:52:48.324000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:48.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323365333935366331316134663335386533396462386432616436 May 8 00:52:48.327400 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:48.353308 env[1219]: time="2025-05-08T00:52:48.353265205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-ngzh4,Uid:a9bf23e9-64ea-441a-ac81-81de620871c1,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848\"" May 8 00:52:48.719605 systemd-networkd[1043]: cali2d14889fb6d: Gained IPv6LL May 8 00:52:49.020240 env[1219]: time="2025-05-08T00:52:49.020134365Z" level=info msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.069 [INFO][3944] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.069 [INFO][3944] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" iface="eth0" netns="/var/run/netns/cni-db1d1619-11ad-86ea-eda0-f49fda00b42f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.069 [INFO][3944] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" iface="eth0" netns="/var/run/netns/cni-db1d1619-11ad-86ea-eda0-f49fda00b42f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.070 [INFO][3944] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" iface="eth0" netns="/var/run/netns/cni-db1d1619-11ad-86ea-eda0-f49fda00b42f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.070 [INFO][3944] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.070 [INFO][3944] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.105 [INFO][3953] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.105 [INFO][3953] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.106 [INFO][3953] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.114 [WARNING][3953] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.114 [INFO][3953] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.115 [INFO][3953] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:49.119386 env[1219]: 2025-05-08 00:52:49.117 [INFO][3944] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:52:49.122370 env[1219]: time="2025-05-08T00:52:49.119550849Z" level=info msg="TearDown network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" successfully" May 8 00:52:49.122370 env[1219]: time="2025-05-08T00:52:49.119583655Z" level=info msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" returns successfully" May 8 00:52:49.122370 env[1219]: time="2025-05-08T00:52:49.122071737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-x9jqs,Uid:03263d58-45c7-4ef8-ad8f-306f81cb08d9,Namespace:kube-system,Attempt:1,}" May 8 00:52:49.121494 systemd[1]: run-netns-cni\x2ddb1d1619\x2d11ad\x2d86ea\x2deda0\x2df49fda00b42f.mount: Deactivated successfully. May 8 00:52:49.122569 kubelet[2057]: E0508 00:52:49.119898 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:49.151583 kubelet[2057]: E0508 00:52:49.151331 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:49.231847 systemd-networkd[1043]: cali8105406031a: Link UP May 8 00:52:49.234236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:52:49.234312 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8105406031a: link becomes ready May 8 00:52:49.233562 systemd-networkd[1043]: cali8105406031a: Gained carrier May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.168 [INFO][3962] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0 coredns-7db6d8ff4d- kube-system 03263d58-45c7-4ef8-ad8f-306f81cb08d9 961 0 2025-05-08 00:52:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-x9jqs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8105406031a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.169 [INFO][3962] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.192 [INFO][3976] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" HandleID="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.203 [INFO][3976] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" HandleID="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003696b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-x9jqs", "timestamp":"2025-05-08 00:52:49.192297669 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.203 [INFO][3976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.203 [INFO][3976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.203 [INFO][3976] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.204 [INFO][3976] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.208 [INFO][3976] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.211 [INFO][3976] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.213 [INFO][3976] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.215 [INFO][3976] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.215 [INFO][3976] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.216 [INFO][3976] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788 May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.220 [INFO][3976] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.227 [INFO][3976] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.227 [INFO][3976] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" host="localhost" May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.227 [INFO][3976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:49.248440 env[1219]: 2025-05-08 00:52:49.227 [INFO][3976] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" HandleID="k8s-pod-network.caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.230 [INFO][3962] cni-plugin/k8s.go 386: Populated endpoint ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"03263d58-45c7-4ef8-ad8f-306f81cb08d9", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-x9jqs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8105406031a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.230 [INFO][3962] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.230 [INFO][3962] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8105406031a ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.234 [INFO][3962] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.234 [INFO][3962] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"03263d58-45c7-4ef8-ad8f-306f81cb08d9", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788", Pod:"coredns-7db6d8ff4d-x9jqs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8105406031a", MAC:"f6:6e:6f:df:30:eb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:49.248982 env[1219]: 2025-05-08 00:52:49.243 [INFO][3962] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788" Namespace="kube-system" Pod="coredns-7db6d8ff4d-x9jqs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:52:49.252000 audit[3993]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3993 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:49.252000 audit[3993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=fffff1294f60 a2=0 a3=ffff8add1fa8 items=0 ppid=3328 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.252000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:49.259970 env[1219]: time="2025-05-08T00:52:49.259891693Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:49.259970 env[1219]: time="2025-05-08T00:52:49.259944942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:49.259970 env[1219]: time="2025-05-08T00:52:49.259955504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:49.260213 env[1219]: time="2025-05-08T00:52:49.260184545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788 pid=4007 runtime=io.containerd.runc.v2 May 8 00:52:49.272620 systemd[1]: Started cri-containerd-caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788.scope. May 8 00:52:49.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit: BPF prog-id=177 op=LOAD May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4007 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656233386137646431613237383166666339353335363663666536 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4007 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656233386137646431613237383166666339353335363663666536 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.314000 audit: BPF prog-id=178 op=LOAD May 8 00:52:49.314000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4007 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656233386137646431613237383166666339353335363663666536 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit: BPF prog-id=179 op=LOAD May 8 00:52:49.315000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4007 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656233386137646431613237383166666339353335363663666536 May 8 00:52:49.315000 audit: BPF prog-id=179 op=UNLOAD May 8 00:52:49.315000 audit: BPF prog-id=178 op=UNLOAD May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.315000 audit: BPF prog-id=180 op=LOAD May 8 00:52:49.315000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4007 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656233386137646431613237383166666339353335363663666536 May 8 00:52:49.316078 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:49.336420 env[1219]: time="2025-05-08T00:52:49.336360575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-x9jqs,Uid:03263d58-45c7-4ef8-ad8f-306f81cb08d9,Namespace:kube-system,Attempt:1,} returns sandbox id \"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788\"" May 8 00:52:49.337280 kubelet[2057]: E0508 00:52:49.337059 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:49.340384 env[1219]: time="2025-05-08T00:52:49.340342083Z" level=info msg="CreateContainer within sandbox \"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:52:49.351818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1787668229.mount: Deactivated successfully. May 8 00:52:49.357431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount660509953.mount: Deactivated successfully. May 8 00:52:49.360119 env[1219]: time="2025-05-08T00:52:49.360085835Z" level=info msg="CreateContainer within sandbox \"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"475debb2bf89f07dc144ef992fec4e152ae2ab17e9af7a16c149bc4713af8cd9\"" May 8 00:52:49.360744 env[1219]: time="2025-05-08T00:52:49.360716827Z" level=info msg="StartContainer for \"475debb2bf89f07dc144ef992fec4e152ae2ab17e9af7a16c149bc4713af8cd9\"" May 8 00:52:49.374317 systemd[1]: Started cri-containerd-475debb2bf89f07dc144ef992fec4e152ae2ab17e9af7a16c149bc4713af8cd9.scope. May 8 00:52:49.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.404000 audit: BPF prog-id=181 op=LOAD May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4007 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437356465626232626638396630376463313434656639393266656334 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4007 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437356465626232626638396630376463313434656639393266656334 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit: BPF prog-id=182 op=LOAD May 8 00:52:49.405000 audit[4048]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4007 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437356465626232626638396630376463313434656639393266656334 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit: BPF prog-id=183 op=LOAD May 8 00:52:49.405000 audit[4048]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4007 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437356465626232626638396630376463313434656639393266656334 May 8 00:52:49.405000 audit: BPF prog-id=183 op=UNLOAD May 8 00:52:49.405000 audit: BPF prog-id=182 op=UNLOAD May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.405000 audit: BPF prog-id=184 op=LOAD May 8 00:52:49.405000 audit[4048]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4007 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437356465626232626638396630376463313434656639393266656334 May 8 00:52:49.419475 env[1219]: time="2025-05-08T00:52:49.419436792Z" level=info msg="StartContainer for \"475debb2bf89f07dc144ef992fec4e152ae2ab17e9af7a16c149bc4713af8cd9\" returns successfully" May 8 00:52:49.423511 systemd-networkd[1043]: calid80410c7d76: Gained IPv6LL May 8 00:52:49.706647 env[1219]: time="2025-05-08T00:52:49.706594311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.708192 env[1219]: time="2025-05-08T00:52:49.708159230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.709875 env[1219]: time="2025-05-08T00:52:49.709845690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.711289 env[1219]: time="2025-05-08T00:52:49.711260982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:49.711523 env[1219]: time="2025-05-08T00:52:49.711491903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 8 00:52:49.713421 env[1219]: time="2025-05-08T00:52:49.712606621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:52:49.719215 env[1219]: time="2025-05-08T00:52:49.719182351Z" level=info msg="CreateContainer within sandbox \"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:52:49.728501 env[1219]: time="2025-05-08T00:52:49.728464722Z" level=info msg="CreateContainer within sandbox \"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3a488eab77035e821ec3247aed47243e48a3312d6789aa5c24d9889fb9badb58\"" May 8 00:52:49.729038 env[1219]: time="2025-05-08T00:52:49.729010539Z" level=info msg="StartContainer for \"3a488eab77035e821ec3247aed47243e48a3312d6789aa5c24d9889fb9badb58\"" May 8 00:52:49.748436 systemd[1]: Started cri-containerd-3a488eab77035e821ec3247aed47243e48a3312d6789aa5c24d9889fb9badb58.scope. May 8 00:52:49.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit: BPF prog-id=185 op=LOAD May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3724 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343838656162373730333565383231656333323437616564343732 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3724 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343838656162373730333565383231656333323437616564343732 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.776000 audit: BPF prog-id=186 op=LOAD May 8 00:52:49.776000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3724 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343838656162373730333565383231656333323437616564343732 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit: BPF prog-id=187 op=LOAD May 8 00:52:49.777000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3724 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343838656162373730333565383231656333323437616564343732 May 8 00:52:49.777000 audit: BPF prog-id=187 op=UNLOAD May 8 00:52:49.777000 audit: BPF prog-id=186 op=UNLOAD May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:49.777000 audit: BPF prog-id=188 op=LOAD May 8 00:52:49.777000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3724 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:49.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343838656162373730333565383231656333323437616564343732 May 8 00:52:49.796469 env[1219]: time="2025-05-08T00:52:49.795630109Z" level=info msg="StartContainer for \"3a488eab77035e821ec3247aed47243e48a3312d6789aa5c24d9889fb9badb58\" returns successfully" May 8 00:52:50.020053 env[1219]: time="2025-05-08T00:52:50.019933782Z" level=info msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" May 8 00:52:50.020217 env[1219]: time="2025-05-08T00:52:50.020191227Z" level=info msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.065 [INFO][4152] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.066 [INFO][4152] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" iface="eth0" netns="/var/run/netns/cni-5ffb0ebe-4937-f773-a2fa-a5a366eac030" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.066 [INFO][4152] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" iface="eth0" netns="/var/run/netns/cni-5ffb0ebe-4937-f773-a2fa-a5a366eac030" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.066 [INFO][4152] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" iface="eth0" netns="/var/run/netns/cni-5ffb0ebe-4937-f773-a2fa-a5a366eac030" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.066 [INFO][4152] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.066 [INFO][4152] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.087 [INFO][4174] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.088 [INFO][4174] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.090 [INFO][4174] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.099 [WARNING][4174] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.099 [INFO][4174] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.100 [INFO][4174] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:50.103721 env[1219]: 2025-05-08 00:52:50.102 [INFO][4152] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:52:50.104310 env[1219]: time="2025-05-08T00:52:50.103865867Z" level=info msg="TearDown network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" successfully" May 8 00:52:50.104310 env[1219]: time="2025-05-08T00:52:50.103901713Z" level=info msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" returns successfully" May 8 00:52:50.104630 env[1219]: time="2025-05-08T00:52:50.104603716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k6ltj,Uid:f79535ef-7f28-43da-af71-72d8363737d7,Namespace:calico-system,Attempt:1,}" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" iface="eth0" netns="/var/run/netns/cni-aa60aae7-6712-8a3c-cf11-408c92a16e16" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" iface="eth0" netns="/var/run/netns/cni-aa60aae7-6712-8a3c-cf11-408c92a16e16" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" iface="eth0" netns="/var/run/netns/cni-aa60aae7-6712-8a3c-cf11-408c92a16e16" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.070 [INFO][4164] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.104 [INFO][4181] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.105 [INFO][4181] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.105 [INFO][4181] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.113 [WARNING][4181] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.113 [INFO][4181] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.114 [INFO][4181] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:50.119079 env[1219]: 2025-05-08 00:52:50.116 [INFO][4164] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:52:50.119707 env[1219]: time="2025-05-08T00:52:50.119226787Z" level=info msg="TearDown network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" successfully" May 8 00:52:50.119707 env[1219]: time="2025-05-08T00:52:50.119259193Z" level=info msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" returns successfully" May 8 00:52:50.119975 env[1219]: time="2025-05-08T00:52:50.119920709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-2flcf,Uid:55c5af30-5df0-482a-8414-c894f1318ee7,Namespace:calico-apiserver,Attempt:1,}" May 8 00:52:50.161685 kubelet[2057]: E0508 00:52:50.161653 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:50.166407 kubelet[2057]: I0508 00:52:50.166351 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-876857c46-494nx" podStartSLOduration=21.118383235 podStartE2EDuration="23.166337168s" podCreationTimestamp="2025-05-08 00:52:27 +0000 UTC" firstStartedPulling="2025-05-08 00:52:47.664253777 +0000 UTC m=+45.765010997" lastFinishedPulling="2025-05-08 00:52:49.71220771 +0000 UTC m=+47.812964930" observedRunningTime="2025-05-08 00:52:50.165097311 +0000 UTC m=+48.265854531" watchObservedRunningTime="2025-05-08 00:52:50.166337168 +0000 UTC m=+48.267094348" May 8 00:52:50.190000 audit[4231]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.190000 audit[4231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffcdf9c850 a2=0 a3=1 items=0 ppid=2220 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:50.201000 audit[4231]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:50.201000 audit[4231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffcdf9c850 a2=0 a3=1 items=0 ppid=2220 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:50.255501 systemd-networkd[1043]: cali4fe8db82e28: Gained IPv6LL May 8 00:52:50.323968 systemd[1]: run-netns-cni\x2d5ffb0ebe\x2d4937\x2df773\x2da2fa\x2da5a366eac030.mount: Deactivated successfully. May 8 00:52:50.324053 systemd[1]: run-netns-cni\x2daa60aae7\x2d6712\x2d8a3c\x2dcf11\x2d408c92a16e16.mount: Deactivated successfully. May 8 00:52:50.349047 kubelet[2057]: I0508 00:52:50.347736 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-x9jqs" podStartSLOduration=31.347716457 podStartE2EDuration="31.347716457s" podCreationTimestamp="2025-05-08 00:52:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:52:50.175764013 +0000 UTC m=+48.276521193" watchObservedRunningTime="2025-05-08 00:52:50.347716457 +0000 UTC m=+48.448473677" May 8 00:52:50.383546 systemd-networkd[1043]: cali8105406031a: Gained IPv6LL May 8 00:52:50.433877 systemd-networkd[1043]: calie81a47fbffb: Link UP May 8 00:52:50.436146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:52:50.436233 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie81a47fbffb: link becomes ready May 8 00:52:50.436364 systemd-networkd[1043]: calie81a47fbffb: Gained carrier May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.188 [INFO][4193] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--k6ltj-eth0 csi-node-driver- calico-system f79535ef-7f28-43da-af71-72d8363737d7 978 0 2025-05-08 00:52:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-k6ltj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie81a47fbffb [] []}} ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.188 [INFO][4193] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.231 [INFO][4235] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" HandleID="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.249 [INFO][4235] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" HandleID="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c160), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-k6ltj", "timestamp":"2025-05-08 00:52:50.231418724 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.249 [INFO][4235] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.249 [INFO][4235] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.250 [INFO][4235] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.251 [INFO][4235] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.279 [INFO][4235] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.284 [INFO][4235] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.285 [INFO][4235] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.348 [INFO][4235] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.348 [INFO][4235] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.350 [INFO][4235] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329 May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.408 [INFO][4235] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.429 [INFO][4235] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.429 [INFO][4235] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" host="localhost" May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.429 [INFO][4235] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:50.450686 env[1219]: 2025-05-08 00:52:50.429 [INFO][4235] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" HandleID="k8s-pod-network.129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.431 [INFO][4193] cni-plugin/k8s.go 386: Populated endpoint ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k6ltj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f79535ef-7f28-43da-af71-72d8363737d7", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-k6ltj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie81a47fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.431 [INFO][4193] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.431 [INFO][4193] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie81a47fbffb ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.436 [INFO][4193] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.437 [INFO][4193] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k6ltj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f79535ef-7f28-43da-af71-72d8363737d7", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329", Pod:"csi-node-driver-k6ltj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie81a47fbffb", MAC:"f2:5e:7f:c3:ce:85", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:50.451533 env[1219]: 2025-05-08 00:52:50.447 [INFO][4193] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329" Namespace="calico-system" Pod="csi-node-driver-k6ltj" WorkloadEndpoint="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:52:50.460000 audit[4277]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4277 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:50.460000 audit[4277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22204 a0=3 a1=ffffd964c810 a2=0 a3=ffff95772fa8 items=0 ppid=3328 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.460000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:50.464801 env[1219]: time="2025-05-08T00:52:50.463514743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:50.464801 env[1219]: time="2025-05-08T00:52:50.463552989Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:50.464801 env[1219]: time="2025-05-08T00:52:50.463563311Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:50.464801 env[1219]: time="2025-05-08T00:52:50.463686813Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329 pid=4285 runtime=io.containerd.runc.v2 May 8 00:52:50.476827 systemd-networkd[1043]: calif861b3aca40: Link UP May 8 00:52:50.477901 systemd-networkd[1043]: calif861b3aca40: Gained carrier May 8 00:52:50.478920 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif861b3aca40: link becomes ready May 8 00:52:50.485018 systemd[1]: Started cri-containerd-129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329.scope. May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.192 [INFO][4191] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0 calico-apiserver-5bd8f59f4b- calico-apiserver 55c5af30-5df0-482a-8414-c894f1318ee7 979 0 2025-05-08 00:52:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bd8f59f4b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5bd8f59f4b-2flcf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif861b3aca40 [] []}} ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.193 [INFO][4191] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.237 [INFO][4243] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" HandleID="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.278 [INFO][4243] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" HandleID="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027eb20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5bd8f59f4b-2flcf", "timestamp":"2025-05-08 00:52:50.237858808 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.279 [INFO][4243] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.429 [INFO][4243] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.429 [INFO][4243] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.431 [INFO][4243] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.440 [INFO][4243] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.449 [INFO][4243] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.452 [INFO][4243] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.454 [INFO][4243] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.454 [INFO][4243] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.457 [INFO][4243] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.461 [INFO][4243] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.471 [INFO][4243] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.471 [INFO][4243] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" host="localhost" May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.471 [INFO][4243] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:52:50.494987 env[1219]: 2025-05-08 00:52:50.471 [INFO][4243] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" HandleID="k8s-pod-network.d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.473 [INFO][4191] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"55c5af30-5df0-482a-8414-c894f1318ee7", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5bd8f59f4b-2flcf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif861b3aca40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.473 [INFO][4191] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.473 [INFO][4191] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif861b3aca40 ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.477 [INFO][4191] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.478 [INFO][4191] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"55c5af30-5df0-482a-8414-c894f1318ee7", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be", Pod:"calico-apiserver-5bd8f59f4b-2flcf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif861b3aca40", MAC:"02:7b:28:95:28:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:52:50.495611 env[1219]: 2025-05-08 00:52:50.492 [INFO][4191] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be" Namespace="calico-apiserver" Pod="calico-apiserver-5bd8f59f4b-2flcf" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:52:50.502000 audit[4315]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=4315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:52:50.502000 audit[4315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25080 a0=3 a1=ffffe7aa2ad0 a2=0 a3=ffff81746fa8 items=0 ppid=3328 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:52:50.515466 env[1219]: time="2025-05-08T00:52:50.515266253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:52:50.515466 env[1219]: time="2025-05-08T00:52:50.515306860Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:52:50.515466 env[1219]: time="2025-05-08T00:52:50.515317262Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:52:50.515766 env[1219]: time="2025-05-08T00:52:50.515668803Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be pid=4332 runtime=io.containerd.runc.v2 May 8 00:52:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.522000 audit: BPF prog-id=189 op=LOAD May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4285 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396563366264313330653562653465373634326639303333306465 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4285 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396563366264313330653562653465373634326639303333306465 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit: BPF prog-id=190 op=LOAD May 8 00:52:50.524000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4285 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396563366264313330653562653465373634326639303333306465 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.524000 audit: BPF prog-id=191 op=LOAD May 8 00:52:50.524000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4285 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396563366264313330653562653465373634326639303333306465 May 8 00:52:50.525000 audit: BPF prog-id=191 op=UNLOAD May 8 00:52:50.525000 audit: BPF prog-id=190 op=UNLOAD May 8 00:52:50.525000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.525000 audit: BPF prog-id=192 op=LOAD May 8 00:52:50.525000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4285 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396563366264313330653562653465373634326639303333306465 May 8 00:52:50.526179 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:50.536467 systemd[1]: Started cri-containerd-d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be.scope. May 8 00:52:50.551204 env[1219]: time="2025-05-08T00:52:50.549581601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k6ltj,Uid:f79535ef-7f28-43da-af71-72d8363737d7,Namespace:calico-system,Attempt:1,} returns sandbox id \"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329\"" May 8 00:52:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.557000 audit: BPF prog-id=193 op=LOAD May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323935346332646336373963656661353465666366646430373535 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323935346332646336373963656661353465666366646430373535 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.558000 audit: BPF prog-id=194 op=LOAD May 8 00:52:50.558000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323935346332646336373963656661353465666366646430373535 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.559000 audit: BPF prog-id=195 op=LOAD May 8 00:52:50.559000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323935346332646336373963656661353465666366646430373535 May 8 00:52:50.560000 audit: BPF prog-id=195 op=UNLOAD May 8 00:52:50.560000 audit: BPF prog-id=194 op=UNLOAD May 8 00:52:50.560000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:50.560000 audit: BPF prog-id=196 op=LOAD May 8 00:52:50.560000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:50.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323935346332646336373963656661353465666366646430373535 May 8 00:52:50.561782 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:52:50.576900 env[1219]: time="2025-05-08T00:52:50.576799870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bd8f59f4b-2flcf,Uid:55c5af30-5df0-482a-8414-c894f1318ee7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be\"" May 8 00:52:51.165629 kubelet[2057]: E0508 00:52:51.165598 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:51.791888 systemd-networkd[1043]: calie81a47fbffb: Gained IPv6LL May 8 00:52:51.814520 env[1219]: time="2025-05-08T00:52:51.814471251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:51.816065 env[1219]: time="2025-05-08T00:52:51.816026877Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:51.817396 env[1219]: time="2025-05-08T00:52:51.817361466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:51.818904 env[1219]: time="2025-05-08T00:52:51.818871285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:51.819326 env[1219]: time="2025-05-08T00:52:51.819295917Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 8 00:52:51.821822 env[1219]: time="2025-05-08T00:52:51.821631718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:52:51.822636 env[1219]: time="2025-05-08T00:52:51.822606285Z" level=info msg="CreateContainer within sandbox \"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:52:51.833601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3240901022.mount: Deactivated successfully. May 8 00:52:51.835803 env[1219]: time="2025-05-08T00:52:51.835766619Z" level=info msg="CreateContainer within sandbox \"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"27c7e123775e7ed5205057d7eb65af99f3d95f9bb116458b3ad17e8b87403b1b\"" May 8 00:52:51.836291 env[1219]: time="2025-05-08T00:52:51.836264784Z" level=info msg="StartContainer for \"27c7e123775e7ed5205057d7eb65af99f3d95f9bb116458b3ad17e8b87403b1b\"" May 8 00:52:51.856466 systemd[1]: Started cri-containerd-27c7e123775e7ed5205057d7eb65af99f3d95f9bb116458b3ad17e8b87403b1b.scope. May 8 00:52:51.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.906499 kernel: kauditd_printk_skb: 550 callbacks suppressed May 8 00:52:51.906560 kernel: audit: type=1400 audit(1746665571.904:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.911312 kernel: audit: type=1400 audit(1746665571.904:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.911376 kernel: audit: type=1400 audit(1746665571.904:1350): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.916037 kernel: audit: type=1400 audit(1746665571.904:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.916090 kernel: audit: type=1400 audit(1746665571.904:1352): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.920913 kernel: audit: type=1400 audit(1746665571.904:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.921072 kernel: audit: type=1400 audit(1746665571.904:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.923169 kernel: audit: type=1400 audit(1746665571.904:1355): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.927834 kernel: audit: type=1400 audit(1746665571.904:1356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.927873 kernel: audit: type=1400 audit(1746665571.905:1357): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit: BPF prog-id=197 op=LOAD May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3894 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633765313233373735653765643532303530353764376562363561 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3894 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633765313233373735653765643532303530353764376562363561 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.905000 audit: BPF prog-id=198 op=LOAD May 8 00:52:51.905000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3894 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633765313233373735653765643532303530353764376562363561 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.907000 audit: BPF prog-id=199 op=LOAD May 8 00:52:51.907000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3894 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633765313233373735653765643532303530353764376562363561 May 8 00:52:51.910000 audit: BPF prog-id=199 op=UNLOAD May 8 00:52:51.910000 audit: BPF prog-id=198 op=UNLOAD May 8 00:52:51.910000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:51.910000 audit: BPF prog-id=200 op=LOAD May 8 00:52:51.910000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3894 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:51.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633765313233373735653765643532303530353764376562363561 May 8 00:52:51.957219 systemd[1]: Started sshd@13-10.0.0.127:22-10.0.0.1:46654.service. May 8 00:52:51.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.127:22-10.0.0.1:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:51.967885 env[1219]: time="2025-05-08T00:52:51.965741486Z" level=info msg="StartContainer for \"27c7e123775e7ed5205057d7eb65af99f3d95f9bb116458b3ad17e8b87403b1b\" returns successfully" May 8 00:52:52.003000 audit[4408]: USER_ACCT pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.004885 sshd[4408]: Accepted publickey for core from 10.0.0.1 port 46654 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:52.004000 audit[4408]: CRED_ACQ pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.004000 audit[4408]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9c03d20 a2=3 a3=1 items=0 ppid=1 pid=4408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:52.006481 sshd[4408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:52.010142 systemd-logind[1205]: New session 14 of user core. May 8 00:52:52.010969 systemd[1]: Started session-14.scope. May 8 00:52:52.013000 audit[4408]: USER_START pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.014000 audit[4414]: CRED_ACQ pid=4414 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.111837 systemd-networkd[1043]: calif861b3aca40: Gained IPv6LL May 8 00:52:52.171053 kubelet[2057]: E0508 00:52:52.171002 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:52.177753 sshd[4408]: pam_unix(sshd:session): session closed for user core May 8 00:52:52.177000 audit[4408]: USER_END pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.177000 audit[4408]: CRED_DISP pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:52.180268 systemd-logind[1205]: Session 14 logged out. Waiting for processes to exit. May 8 00:52:52.180499 systemd[1]: sshd@13-10.0.0.127:22-10.0.0.1:46654.service: Deactivated successfully. May 8 00:52:52.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.127:22-10.0.0.1:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:52.181248 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:52:52.181838 systemd-logind[1205]: Removed session 14. May 8 00:52:52.186245 kubelet[2057]: I0508 00:52:52.186189 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-ngzh4" podStartSLOduration=23.720718099 podStartE2EDuration="27.186173099s" podCreationTimestamp="2025-05-08 00:52:25 +0000 UTC" firstStartedPulling="2025-05-08 00:52:48.354623531 +0000 UTC m=+46.455380711" lastFinishedPulling="2025-05-08 00:52:51.820078491 +0000 UTC m=+49.920835711" observedRunningTime="2025-05-08 00:52:52.186114209 +0000 UTC m=+50.286871429" watchObservedRunningTime="2025-05-08 00:52:52.186173099 +0000 UTC m=+50.286930319" May 8 00:52:52.193000 audit[4425]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:52.193000 audit[4425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd7bbb4d0 a2=0 a3=1 items=0 ppid=2220 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:52.197000 audit[4425]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:52.197000 audit[4425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd7bbb4d0 a2=0 a3=1 items=0 ppid=2220 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:52.830576 env[1219]: time="2025-05-08T00:52:52.830528609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.830634 systemd[1]: run-containerd-runc-k8s.io-27c7e123775e7ed5205057d7eb65af99f3d95f9bb116458b3ad17e8b87403b1b-runc.r9sUOg.mount: Deactivated successfully. May 8 00:52:52.833719 env[1219]: time="2025-05-08T00:52:52.833679419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.835403 env[1219]: time="2025-05-08T00:52:52.835367223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.837060 env[1219]: time="2025-05-08T00:52:52.837029543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:52.837884 env[1219]: time="2025-05-08T00:52:52.837835039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 8 00:52:52.839734 env[1219]: time="2025-05-08T00:52:52.839707674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:52:52.841223 env[1219]: time="2025-05-08T00:52:52.841184883Z" level=info msg="CreateContainer within sandbox \"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:52:52.862073 env[1219]: time="2025-05-08T00:52:52.862021110Z" level=info msg="CreateContainer within sandbox \"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0c35d241e2234ff15c7eabc5ff392813814b65e1921dd816c42a702b9f14b4b6\"" May 8 00:52:52.863200 env[1219]: time="2025-05-08T00:52:52.863175064Z" level=info msg="StartContainer for \"0c35d241e2234ff15c7eabc5ff392813814b65e1921dd816c42a702b9f14b4b6\"" May 8 00:52:52.885878 systemd[1]: Started cri-containerd-0c35d241e2234ff15c7eabc5ff392813814b65e1921dd816c42a702b9f14b4b6.scope. May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4285 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063333564323431653232333466663135633765616263356666333932 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.916000 audit: BPF prog-id=201 op=LOAD May 8 00:52:52.916000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4285 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063333564323431653232333466663135633765616263356666333932 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.917000 audit: BPF prog-id=202 op=LOAD May 8 00:52:52.917000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4285 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063333564323431653232333466663135633765616263356666333932 May 8 00:52:52.918000 audit: BPF prog-id=202 op=UNLOAD May 8 00:52:52.918000 audit: BPF prog-id=201 op=UNLOAD May 8 00:52:52.918000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:52.918000 audit: BPF prog-id=203 op=LOAD May 8 00:52:52.918000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4285 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:52.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063333564323431653232333466663135633765616263356666333932 May 8 00:52:52.936921 env[1219]: time="2025-05-08T00:52:52.936866430Z" level=info msg="StartContainer for \"0c35d241e2234ff15c7eabc5ff392813814b65e1921dd816c42a702b9f14b4b6\" returns successfully" May 8 00:52:53.120899 env[1219]: time="2025-05-08T00:52:53.120794938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:53.123603 env[1219]: time="2025-05-08T00:52:53.123569358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:53.125041 env[1219]: time="2025-05-08T00:52:53.125017918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:53.126450 env[1219]: time="2025-05-08T00:52:53.126422830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:53.126904 env[1219]: time="2025-05-08T00:52:53.126880586Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 8 00:52:53.128817 env[1219]: time="2025-05-08T00:52:53.128779460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:52:53.130000 env[1219]: time="2025-05-08T00:52:53.129962296Z" level=info msg="CreateContainer within sandbox \"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:52:53.140120 env[1219]: time="2025-05-08T00:52:53.140081131Z" level=info msg="CreateContainer within sandbox \"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9a29346b1d7d07833869f342dc66829504ff04dc3c1430d67a0a82e96c3cd942\"" May 8 00:52:53.140522 env[1219]: time="2025-05-08T00:52:53.140491559Z" level=info msg="StartContainer for \"9a29346b1d7d07833869f342dc66829504ff04dc3c1430d67a0a82e96c3cd942\"" May 8 00:52:53.154609 systemd[1]: Started cri-containerd-9a29346b1d7d07833869f342dc66829504ff04dc3c1430d67a0a82e96c3cd942.scope. May 8 00:52:53.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.194000 audit: BPF prog-id=204 op=LOAD May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4332 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323933343662316437643037383333383639663334326463363638 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4332 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323933343662316437643037383333383639663334326463363638 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit: BPF prog-id=205 op=LOAD May 8 00:52:53.195000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4332 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323933343662316437643037383333383639663334326463363638 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit: BPF prog-id=206 op=LOAD May 8 00:52:53.195000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4332 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323933343662316437643037383333383639663334326463363638 May 8 00:52:53.195000 audit: BPF prog-id=206 op=UNLOAD May 8 00:52:53.195000 audit: BPF prog-id=205 op=UNLOAD May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:53.195000 audit: BPF prog-id=207 op=LOAD May 8 00:52:53.195000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4332 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323933343662316437643037383333383639663334326463363638 May 8 00:52:53.221578 env[1219]: time="2025-05-08T00:52:53.221517773Z" level=info msg="StartContainer for \"9a29346b1d7d07833869f342dc66829504ff04dc3c1430d67a0a82e96c3cd942\" returns successfully" May 8 00:52:53.335656 kubelet[2057]: I0508 00:52:53.335602 2057 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:52:53.336398 kubelet[2057]: E0508 00:52:53.336370 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:53.576000 audit[4391]: AVC avc: denied { watch } for pid=4391 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_52_34.2634047075/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c32,c295 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c32,c295 tclass=file permissive=0 May 8 00:52:53.576000 audit[4391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400156b560 a2=fc6 a3=0 items=0 ppid=3894 pid=4391 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c32,c295 key=(null) May 8 00:52:53.576000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:52:53.612000 audit[4554]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:53.612000 audit[4554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe2c0fce0 a2=0 a3=1 items=0 ppid=2220 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:53.617000 audit[4554]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:53.617000 audit[4554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe2c0fce0 a2=0 a3=1 items=0 ppid=2220 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:53.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:54.124000 audit[4487]: AVC avc: denied { watch } for pid=4487 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_52_34.4078982736/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c396,c585 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c396,c585 tclass=file permissive=0 May 8 00:52:54.124000 audit[4487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000c94060 a2=fc6 a3=0 items=0 ppid=4332 pid=4487 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c396,c585 key=(null) May 8 00:52:54.124000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:52:54.187975 kubelet[2057]: E0508 00:52:54.187570 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:52:54.204376 kubelet[2057]: I0508 00:52:54.202935 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bd8f59f4b-2flcf" podStartSLOduration=26.654773466 podStartE2EDuration="29.202917915s" podCreationTimestamp="2025-05-08 00:52:25 +0000 UTC" firstStartedPulling="2025-05-08 00:52:50.579791472 +0000 UTC m=+48.680548652" lastFinishedPulling="2025-05-08 00:52:53.127935881 +0000 UTC m=+51.228693101" observedRunningTime="2025-05-08 00:52:54.201803014 +0000 UTC m=+52.302560234" watchObservedRunningTime="2025-05-08 00:52:54.202917915 +0000 UTC m=+52.303675135" May 8 00:52:54.248000 audit[4557]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:54.248000 audit[4557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdd651870 a2=0 a3=1 items=0 ppid=2220 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:54.256000 audit[4557]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:52:54.256000 audit[4557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdd651870 a2=0 a3=1 items=0 ppid=2220 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:52:54.443911 env[1219]: time="2025-05-08T00:52:54.443862133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.446291 env[1219]: time="2025-05-08T00:52:54.446251322Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.447955 env[1219]: time="2025-05-08T00:52:54.447926395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.450495 env[1219]: time="2025-05-08T00:52:54.450457887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:52:54.450887 env[1219]: time="2025-05-08T00:52:54.450855992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 8 00:52:54.453359 env[1219]: time="2025-05-08T00:52:54.453330795Z" level=info msg="CreateContainer within sandbox \"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:52:54.468623 env[1219]: time="2025-05-08T00:52:54.468568398Z" level=info msg="CreateContainer within sandbox \"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e7673d3c51345053670cd08a97074f62fec5afb91972ac2b02cb2e4b24575cac\"" May 8 00:52:54.471365 env[1219]: time="2025-05-08T00:52:54.469499230Z" level=info msg="StartContainer for \"e7673d3c51345053670cd08a97074f62fec5afb91972ac2b02cb2e4b24575cac\"" May 8 00:52:54.488050 systemd[1]: Started cri-containerd-e7673d3c51345053670cd08a97074f62fec5afb91972ac2b02cb2e4b24575cac.scope. May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4285 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363733643363353133343530353336373063643038613937303734 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit: BPF prog-id=208 op=LOAD May 8 00:52:54.511000 audit[4566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4285 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363733643363353133343530353336373063643038613937303734 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit: BPF prog-id=209 op=LOAD May 8 00:52:54.511000 audit[4566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4285 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363733643363353133343530353336373063643038613937303734 May 8 00:52:54.511000 audit: BPF prog-id=209 op=UNLOAD May 8 00:52:54.511000 audit: BPF prog-id=208 op=UNLOAD May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { perfmon } for pid=4566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit[4566]: AVC avc: denied { bpf } for pid=4566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:52:54.511000 audit: BPF prog-id=210 op=LOAD May 8 00:52:54.511000 audit[4566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4285 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:54.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363733643363353133343530353336373063643038613937303734 May 8 00:52:54.528459 env[1219]: time="2025-05-08T00:52:54.528413268Z" level=info msg="StartContainer for \"e7673d3c51345053670cd08a97074f62fec5afb91972ac2b02cb2e4b24575cac\" returns successfully" May 8 00:52:55.083236 kubelet[2057]: I0508 00:52:55.083190 2057 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:52:55.084442 kubelet[2057]: I0508 00:52:55.084422 2057 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:52:55.191465 kubelet[2057]: I0508 00:52:55.191410 2057 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:52:55.203119 kubelet[2057]: I0508 00:52:55.203044 2057 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-k6ltj" podStartSLOduration=25.301784674 podStartE2EDuration="29.203028367s" podCreationTimestamp="2025-05-08 00:52:26 +0000 UTC" firstStartedPulling="2025-05-08 00:52:50.550747124 +0000 UTC m=+48.651504344" lastFinishedPulling="2025-05-08 00:52:54.451990857 +0000 UTC m=+52.552748037" observedRunningTime="2025-05-08 00:52:55.20154789 +0000 UTC m=+53.302305150" watchObservedRunningTime="2025-05-08 00:52:55.203028367 +0000 UTC m=+53.303785627" May 8 00:52:57.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.174258 systemd[1]: Started sshd@14-10.0.0.127:22-10.0.0.1:47742.service. May 8 00:52:57.178858 kernel: kauditd_printk_skb: 225 callbacks suppressed May 8 00:52:57.178951 kernel: audit: type=1130 audit(1746665577.173:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:57.221000 audit[4601]: USER_ACCT pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.222773 sshd[4601]: Accepted publickey for core from 10.0.0.1 port 47742 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:52:57.226416 kernel: audit: type=1101 audit(1746665577.221:1414): pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.225000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.227498 sshd[4601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:52:57.231758 kernel: audit: type=1103 audit(1746665577.225:1415): pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.231825 kernel: audit: type=1006 audit(1746665577.225:1416): pid=4601 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 8 00:52:57.231848 kernel: audit: type=1300 audit(1746665577.225:1416): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcd68990 a2=3 a3=1 items=0 ppid=1 pid=4601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.225000 audit[4601]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcd68990 a2=3 a3=1 items=0 ppid=1 pid=4601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:52:57.234874 systemd[1]: Started session-15.scope. May 8 00:52:57.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:52:57.235358 systemd-logind[1205]: New session 15 of user core. May 8 00:52:57.236138 kernel: audit: type=1327 audit(1746665577.225:1416): proctitle=737368643A20636F7265205B707269765D May 8 00:52:57.238000 audit[4601]: USER_START pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.239000 audit[4603]: CRED_ACQ pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.245932 kernel: audit: type=1105 audit(1746665577.238:1417): pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.246001 kernel: audit: type=1103 audit(1746665577.239:1418): pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.373715 sshd[4601]: pam_unix(sshd:session): session closed for user core May 8 00:52:57.373000 audit[4601]: USER_END pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.376697 systemd[1]: sshd@14-10.0.0.127:22-10.0.0.1:47742.service: Deactivated successfully. May 8 00:52:57.377500 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:52:57.373000 audit[4601]: CRED_DISP pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.378482 systemd-logind[1205]: Session 15 logged out. Waiting for processes to exit. May 8 00:52:57.379517 systemd-logind[1205]: Removed session 15. May 8 00:52:57.381315 kernel: audit: type=1106 audit(1746665577.373:1419): pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.381416 kernel: audit: type=1104 audit(1746665577.373:1420): pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:52:57.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:52:59.436000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.436000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003327ac0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:59.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:59.448000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.448000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002a3d290 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:52:59.448000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:52:59.575000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.575000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40082717a0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:52:59.579000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.579000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4008ccfa10 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.579000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:52:59.585000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.585000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4009a1b410 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:52:59.585000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.585000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4007d6fba0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:52:59.597000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.597000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4008ccfa40 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:52:59.597000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:52:59.597000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=40064054e0 a2=fc6 a3=0 items=0 ppid=1778 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c240 key=(null) May 8 00:52:59.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 8 00:53:02.003661 env[1219]: time="2025-05-08T00:53:02.003445876Z" level=info msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.046 [WARNING][4631] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"03263d58-45c7-4ef8-ad8f-306f81cb08d9", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788", Pod:"coredns-7db6d8ff4d-x9jqs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8105406031a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.046 [INFO][4631] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.046 [INFO][4631] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" iface="eth0" netns="" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.047 [INFO][4631] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.047 [INFO][4631] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.067 [INFO][4642] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.067 [INFO][4642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.067 [INFO][4642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.075 [WARNING][4642] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.075 [INFO][4642] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.077 [INFO][4642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.079997 env[1219]: 2025-05-08 00:53:02.078 [INFO][4631] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.080799 env[1219]: time="2025-05-08T00:53:02.080764449Z" level=info msg="TearDown network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" successfully" May 8 00:53:02.080873 env[1219]: time="2025-05-08T00:53:02.080857503Z" level=info msg="StopPodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" returns successfully" May 8 00:53:02.081426 env[1219]: time="2025-05-08T00:53:02.081397703Z" level=info msg="RemovePodSandbox for \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" May 8 00:53:02.081505 env[1219]: time="2025-05-08T00:53:02.081434148Z" level=info msg="Forcibly stopping sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\"" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.113 [WARNING][4666] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"03263d58-45c7-4ef8-ad8f-306f81cb08d9", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeb38a7dd1a2781ffc953566cfe67c7a7312115d3106a2f54189e32646a1788", Pod:"coredns-7db6d8ff4d-x9jqs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8105406031a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.114 [INFO][4666] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.114 [INFO][4666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" iface="eth0" netns="" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.114 [INFO][4666] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.114 [INFO][4666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.132 [INFO][4674] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.132 [INFO][4674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.132 [INFO][4674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.140 [WARNING][4674] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.140 [INFO][4674] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" HandleID="k8s-pod-network.eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" Workload="localhost-k8s-coredns--7db6d8ff4d--x9jqs-eth0" May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.141 [INFO][4674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.146667 env[1219]: 2025-05-08 00:53:02.144 [INFO][4666] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f" May 8 00:53:02.147098 env[1219]: time="2025-05-08T00:53:02.146682346Z" level=info msg="TearDown network for sandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" successfully" May 8 00:53:02.154306 env[1219]: time="2025-05-08T00:53:02.154264061Z" level=info msg="RemovePodSandbox \"eaf78c33534a23670bf37774bcdb1a46971e8717274cb149ae82a611b78ed53f\" returns successfully" May 8 00:53:02.154905 env[1219]: time="2025-05-08T00:53:02.154880232Z" level=info msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.194 [WARNING][4700] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k6ltj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f79535ef-7f28-43da-af71-72d8363737d7", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329", Pod:"csi-node-driver-k6ltj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie81a47fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.194 [INFO][4700] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.194 [INFO][4700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" iface="eth0" netns="" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.194 [INFO][4700] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.194 [INFO][4700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.215 [INFO][4709] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.215 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.216 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.224 [WARNING][4709] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.224 [INFO][4709] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.225 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.228455 env[1219]: 2025-05-08 00:53:02.227 [INFO][4700] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.228953 env[1219]: time="2025-05-08T00:53:02.228921683Z" level=info msg="TearDown network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" successfully" May 8 00:53:02.229069 env[1219]: time="2025-05-08T00:53:02.229051222Z" level=info msg="StopPodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" returns successfully" May 8 00:53:02.229536 env[1219]: time="2025-05-08T00:53:02.229511250Z" level=info msg="RemovePodSandbox for \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" May 8 00:53:02.229748 env[1219]: time="2025-05-08T00:53:02.229698358Z" level=info msg="Forcibly stopping sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\"" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.264 [WARNING][4732] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k6ltj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f79535ef-7f28-43da-af71-72d8363737d7", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"129ec6bd130e5be4e7642f90330de7c4b4deeff73f4bd4c1b2f4f09fca691329", Pod:"csi-node-driver-k6ltj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie81a47fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.264 [INFO][4732] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.264 [INFO][4732] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" iface="eth0" netns="" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.264 [INFO][4732] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.264 [INFO][4732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.284 [INFO][4741] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.284 [INFO][4741] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.284 [INFO][4741] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.292 [WARNING][4741] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.292 [INFO][4741] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" HandleID="k8s-pod-network.3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" Workload="localhost-k8s-csi--node--driver--k6ltj-eth0" May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.294 [INFO][4741] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.301131 env[1219]: 2025-05-08 00:53:02.299 [INFO][4732] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717" May 8 00:53:02.301707 env[1219]: time="2025-05-08T00:53:02.301670585Z" level=info msg="TearDown network for sandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" successfully" May 8 00:53:02.304837 env[1219]: time="2025-05-08T00:53:02.304802486Z" level=info msg="RemovePodSandbox \"3c1b1b4c903e8bd5d8bf0271a54332455215164b2d78881e7c99b00687563717\" returns successfully" May 8 00:53:02.305450 env[1219]: time="2025-05-08T00:53:02.305421737Z" level=info msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.337 [WARNING][4763] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a9bf23e9-64ea-441a-ac81-81de620871c1", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848", Pod:"calico-apiserver-5bd8f59f4b-ngzh4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fe8db82e28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.338 [INFO][4763] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.338 [INFO][4763] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" iface="eth0" netns="" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.338 [INFO][4763] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.338 [INFO][4763] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.355 [INFO][4771] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.355 [INFO][4771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.355 [INFO][4771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.363 [WARNING][4771] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.363 [INFO][4771] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.365 [INFO][4771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.368035 env[1219]: 2025-05-08 00:53:02.366 [INFO][4763] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.368526 env[1219]: time="2025-05-08T00:53:02.368068672Z" level=info msg="TearDown network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" successfully" May 8 00:53:02.368526 env[1219]: time="2025-05-08T00:53:02.368101557Z" level=info msg="StopPodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" returns successfully" May 8 00:53:02.368758 env[1219]: time="2025-05-08T00:53:02.368729649Z" level=info msg="RemovePodSandbox for \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" May 8 00:53:02.368896 env[1219]: time="2025-05-08T00:53:02.368862629Z" level=info msg="Forcibly stopping sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\"" May 8 00:53:02.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:47754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.379850 kernel: kauditd_printk_skb: 25 callbacks suppressed May 8 00:53:02.380076 kernel: audit: type=1130 audit(1746665582.378:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:47754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.378968 systemd[1]: Started sshd@15-10.0.0.127:22-10.0.0.1:47754.service. May 8 00:53:02.427000 audit[4801]: USER_ACCT pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.428431 sshd[4801]: Accepted publickey for core from 10.0.0.1 port 47754 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:02.433627 kernel: audit: type=1101 audit(1746665582.427:1431): pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.434000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.435921 sshd[4801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:02.440212 systemd[1]: Started session-16.scope. May 8 00:53:02.440407 kernel: audit: type=1103 audit(1746665582.434:1432): pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.440439 kernel: audit: type=1006 audit(1746665582.435:1433): pid=4801 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 8 00:53:02.440465 kernel: audit: type=1300 audit(1746665582.435:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2926880 a2=3 a3=1 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:02.435000 audit[4801]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2926880 a2=3 a3=1 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:02.440702 systemd-logind[1205]: New session 16 of user core. May 8 00:53:02.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:02.445359 kernel: audit: type=1327 audit(1746665582.435:1433): proctitle=737368643A20636F7265205B707269765D May 8 00:53:02.447000 audit[4801]: USER_START pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.448000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.454177 kernel: audit: type=1105 audit(1746665582.447:1434): pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.454262 kernel: audit: type=1103 audit(1746665582.448:1435): pid=4816 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.408 [WARNING][4795] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a9bf23e9-64ea-441a-ac81-81de620871c1", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5623e3956c11a4f358e39db8d2ad6fbcfead107fc59296ecb82674e4f6aa8848", Pod:"calico-apiserver-5bd8f59f4b-ngzh4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fe8db82e28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.409 [INFO][4795] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.409 [INFO][4795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" iface="eth0" netns="" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.409 [INFO][4795] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.409 [INFO][4795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.427 [INFO][4806] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.428 [INFO][4806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.428 [INFO][4806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.442 [WARNING][4806] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.442 [INFO][4806] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" HandleID="k8s-pod-network.f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--ngzh4-eth0" May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.446 [INFO][4806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.456463 env[1219]: 2025-05-08 00:53:02.451 [INFO][4795] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275" May 8 00:53:02.456965 env[1219]: time="2025-05-08T00:53:02.456923303Z" level=info msg="TearDown network for sandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" successfully" May 8 00:53:02.459894 env[1219]: time="2025-05-08T00:53:02.459859335Z" level=info msg="RemovePodSandbox \"f03e2112ff8369e7b9be64eb29962b60155e850998843b60cc2f79e6f7764275\" returns successfully" May 8 00:53:02.460507 env[1219]: time="2025-05-08T00:53:02.460480226Z" level=info msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.494 [WARNING][4836] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0", GenerateName:"calico-kube-controllers-876857c46-", Namespace:"calico-system", SelfLink:"", UID:"e4ca0235-7684-4362-b53c-97dd22ef8685", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"876857c46", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a", Pod:"calico-kube-controllers-876857c46-494nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid80410c7d76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.494 [INFO][4836] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.494 [INFO][4836] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" iface="eth0" netns="" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.494 [INFO][4836] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.494 [INFO][4836] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.515 [INFO][4848] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.516 [INFO][4848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.516 [INFO][4848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.526 [WARNING][4848] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.526 [INFO][4848] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.527 [INFO][4848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.531630 env[1219]: 2025-05-08 00:53:02.529 [INFO][4836] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.532683 env[1219]: time="2025-05-08T00:53:02.531649815Z" level=info msg="TearDown network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" successfully" May 8 00:53:02.532683 env[1219]: time="2025-05-08T00:53:02.531682380Z" level=info msg="StopPodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" returns successfully" May 8 00:53:02.532683 env[1219]: time="2025-05-08T00:53:02.532604475Z" level=info msg="RemovePodSandbox for \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" May 8 00:53:02.532683 env[1219]: time="2025-05-08T00:53:02.532635880Z" level=info msg="Forcibly stopping sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\"" May 8 00:53:02.585786 sshd[4801]: pam_unix(sshd:session): session closed for user core May 8 00:53:02.586000 audit[4801]: USER_END pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.590826 systemd[1]: Started sshd@16-10.0.0.127:22-10.0.0.1:47602.service. May 8 00:53:02.586000 audit[4801]: CRED_DISP pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.593571 systemd[1]: sshd@15-10.0.0.127:22-10.0.0.1:47754.service: Deactivated successfully. May 8 00:53:02.594225 kernel: audit: type=1106 audit(1746665582.586:1436): pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.594284 kernel: audit: type=1104 audit(1746665582.586:1437): pid=4801 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.127:22-10.0.0.1:47602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:47754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.594210 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:53:02.595271 systemd-logind[1205]: Session 16 logged out. Waiting for processes to exit. May 8 00:53:02.596082 systemd-logind[1205]: Removed session 16. May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.575 [WARNING][4876] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0", GenerateName:"calico-kube-controllers-876857c46-", Namespace:"calico-system", SelfLink:"", UID:"e4ca0235-7684-4362-b53c-97dd22ef8685", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"876857c46", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eb10028c691d995b3a277b58fed7bb8db3095392b380b9a99022fa0d4aa8539a", Pod:"calico-kube-controllers-876857c46-494nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid80410c7d76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.575 [INFO][4876] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.575 [INFO][4876] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" iface="eth0" netns="" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.575 [INFO][4876] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.575 [INFO][4876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.609 [INFO][4885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.609 [INFO][4885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.610 [INFO][4885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.618 [WARNING][4885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.618 [INFO][4885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" HandleID="k8s-pod-network.2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" Workload="localhost-k8s-calico--kube--controllers--876857c46--494nx-eth0" May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.620 [INFO][4885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.623358 env[1219]: 2025-05-08 00:53:02.621 [INFO][4876] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0" May 8 00:53:02.624068 env[1219]: time="2025-05-08T00:53:02.624022523Z" level=info msg="TearDown network for sandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" successfully" May 8 00:53:02.631315 env[1219]: time="2025-05-08T00:53:02.631273630Z" level=info msg="RemovePodSandbox \"2c4043bd6e94a930589902ef963138fbf137001fdca4d4a97232887624f8e7b0\" returns successfully" May 8 00:53:02.632014 env[1219]: time="2025-05-08T00:53:02.631991015Z" level=info msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" May 8 00:53:02.634000 audit[4892]: USER_ACCT pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.635550 sshd[4892]: Accepted publickey for core from 10.0.0.1 port 47602 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:02.635000 audit[4892]: CRED_ACQ pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.635000 audit[4892]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4365020 a2=3 a3=1 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:02.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:02.636479 sshd[4892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:02.640745 systemd[1]: Started session-17.scope. May 8 00:53:02.641080 systemd-logind[1205]: New session 17 of user core. May 8 00:53:02.644000 audit[4892]: USER_START pid=4892 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.645000 audit[4917]: CRED_ACQ pid=4917 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.670 [WARNING][4911] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369", Pod:"coredns-7db6d8ff4d-dblrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2d14889fb6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.671 [INFO][4911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.671 [INFO][4911] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" iface="eth0" netns="" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.671 [INFO][4911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.671 [INFO][4911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.691 [INFO][4921] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.691 [INFO][4921] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.691 [INFO][4921] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.701 [WARNING][4921] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.701 [INFO][4921] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.702 [INFO][4921] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.707409 env[1219]: 2025-05-08 00:53:02.704 [INFO][4911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.707972 env[1219]: time="2025-05-08T00:53:02.707459197Z" level=info msg="TearDown network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" successfully" May 8 00:53:02.707972 env[1219]: time="2025-05-08T00:53:02.707491641Z" level=info msg="StopPodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" returns successfully" May 8 00:53:02.708499 env[1219]: time="2025-05-08T00:53:02.708463744Z" level=info msg="RemovePodSandbox for \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" May 8 00:53:02.708574 env[1219]: time="2025-05-08T00:53:02.708502150Z" level=info msg="Forcibly stopping sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\"" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.745 [WARNING][4950] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b02b9103-7c5d-4a1c-aab1-9c7de87e2acb", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4be3c8db49d4bd0fc29cbce3bb453fdcb5e3c277cf1bb782101e1b0c23c9369", Pod:"coredns-7db6d8ff4d-dblrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2d14889fb6d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.746 [INFO][4950] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.746 [INFO][4950] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" iface="eth0" netns="" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.746 [INFO][4950] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.746 [INFO][4950] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.767 [INFO][4958] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.768 [INFO][4958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.768 [INFO][4958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.776 [WARNING][4958] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.776 [INFO][4958] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" HandleID="k8s-pod-network.52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" Workload="localhost-k8s-coredns--7db6d8ff4d--dblrj-eth0" May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.778 [INFO][4958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.782060 env[1219]: 2025-05-08 00:53:02.779 [INFO][4950] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67" May 8 00:53:02.782589 env[1219]: time="2025-05-08T00:53:02.782092575Z" level=info msg="TearDown network for sandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" successfully" May 8 00:53:02.788162 env[1219]: time="2025-05-08T00:53:02.788114101Z" level=info msg="RemovePodSandbox \"52dace18a229954b7be9d1196efea029fb2c09d5a2190a6dcb7bde28786edc67\" returns successfully" May 8 00:53:02.788737 env[1219]: time="2025-05-08T00:53:02.788712189Z" level=info msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.833 [WARNING][4982] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"55c5af30-5df0-482a-8414-c894f1318ee7", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be", Pod:"calico-apiserver-5bd8f59f4b-2flcf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif861b3aca40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.833 [INFO][4982] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.833 [INFO][4982] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" iface="eth0" netns="" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.833 [INFO][4982] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.833 [INFO][4982] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.855 [INFO][4990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.855 [INFO][4990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.855 [INFO][4990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.864 [WARNING][4990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.864 [INFO][4990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.866 [INFO][4990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.870837 env[1219]: 2025-05-08 00:53:02.868 [INFO][4982] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.870837 env[1219]: time="2025-05-08T00:53:02.870804425Z" level=info msg="TearDown network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" successfully" May 8 00:53:02.870837 env[1219]: time="2025-05-08T00:53:02.870830469Z" level=info msg="StopPodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" returns successfully" May 8 00:53:02.871350 env[1219]: time="2025-05-08T00:53:02.871086786Z" level=info msg="RemovePodSandbox for \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" May 8 00:53:02.871350 env[1219]: time="2025-05-08T00:53:02.871117551Z" level=info msg="Forcibly stopping sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\"" May 8 00:53:02.877634 sshd[4892]: pam_unix(sshd:session): session closed for user core May 8 00:53:02.880000 audit[4892]: USER_END pid=4892 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.881000 audit[4892]: CRED_DISP pid=4892 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.884533 systemd[1]: sshd@16-10.0.0.127:22-10.0.0.1:47602.service: Deactivated successfully. May 8 00:53:02.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.127:22-10.0.0.1:47602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.885139 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:53:02.886509 systemd-logind[1205]: Session 17 logged out. Waiting for processes to exit. May 8 00:53:02.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.127:22-10.0.0.1:47604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:02.887669 systemd[1]: Started sshd@17-10.0.0.127:22-10.0.0.1:47604.service. May 8 00:53:02.888657 systemd-logind[1205]: Removed session 17. May 8 00:53:02.932000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.932778 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 47604 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:02.933000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.933000 audit[5017]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb4ea130 a2=3 a3=1 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:02.933000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:02.934491 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:02.938379 systemd-logind[1205]: New session 18 of user core. May 8 00:53:02.938823 systemd[1]: Started session-18.scope. May 8 00:53:02.942000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.944000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.925 [WARNING][5018] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0", GenerateName:"calico-apiserver-5bd8f59f4b-", Namespace:"calico-apiserver", SelfLink:"", UID:"55c5af30-5df0-482a-8414-c894f1318ee7", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 52, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bd8f59f4b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d92954c2dc679cefa54efcfdd0755526b62118961bdca990554c888be5cb21be", Pod:"calico-apiserver-5bd8f59f4b-2flcf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif861b3aca40", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.925 [INFO][5018] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.926 [INFO][5018] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" iface="eth0" netns="" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.926 [INFO][5018] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.926 [INFO][5018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.952 [INFO][5028] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.952 [INFO][5028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.952 [INFO][5028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.960 [WARNING][5028] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.960 [INFO][5028] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" HandleID="k8s-pod-network.80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" Workload="localhost-k8s-calico--apiserver--5bd8f59f4b--2flcf-eth0" May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.961 [INFO][5028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:53:02.964456 env[1219]: 2025-05-08 00:53:02.962 [INFO][5018] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb" May 8 00:53:02.964862 env[1219]: time="2025-05-08T00:53:02.964490766Z" level=info msg="TearDown network for sandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" successfully" May 8 00:53:02.967324 env[1219]: time="2025-05-08T00:53:02.967296619Z" level=info msg="RemovePodSandbox \"80ccbdc2a16d21b76dab9279bf8bb0044811746c0f282d10fb4a022836fa3ffb\" returns successfully" May 8 00:53:04.474000 audit[5050]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.474000 audit[5050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcfdd9b80 a2=0 a3=1 items=0 ppid=2220 pid=5050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.483000 audit[5050]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.483000 audit[5050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcfdd9b80 a2=0 a3=1 items=0 ppid=2220 pid=5050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.488615 sshd[5017]: pam_unix(sshd:session): session closed for user core May 8 00:53:04.488000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.488000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.492650 systemd[1]: Started sshd@18-10.0.0.127:22-10.0.0.1:47612.service. May 8 00:53:04.493151 systemd[1]: sshd@17-10.0.0.127:22-10.0.0.1:47604.service: Deactivated successfully. May 8 00:53:04.493904 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:53:04.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.127:22-10.0.0.1:47612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:04.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.127:22-10.0.0.1:47604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:04.494577 systemd-logind[1205]: Session 18 logged out. Waiting for processes to exit. May 8 00:53:04.495799 systemd-logind[1205]: Removed session 18. May 8 00:53:04.505000 audit[5055]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=5055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.505000 audit[5055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff4a7f130 a2=0 a3=1 items=0 ppid=2220 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.510000 audit[5055]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:04.510000 audit[5055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff4a7f130 a2=0 a3=1 items=0 ppid=2220 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:04.540000 audit[5052]: USER_ACCT pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.544578 sshd[5052]: Accepted publickey for core from 10.0.0.1 port 47612 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:04.543810 sshd[5052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:04.542000 audit[5052]: CRED_ACQ pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.542000 audit[5052]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff596e5d0 a2=3 a3=1 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:04.547848 systemd-logind[1205]: New session 19 of user core. May 8 00:53:04.548255 systemd[1]: Started session-19.scope. May 8 00:53:04.550000 audit[5052]: USER_START pid=5052 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.552000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.799730 sshd[5052]: pam_unix(sshd:session): session closed for user core May 8 00:53:04.799000 audit[5052]: USER_END pid=5052 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.799000 audit[5052]: CRED_DISP pid=5052 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.127:22-10.0.0.1:47612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:04.803725 systemd[1]: sshd@18-10.0.0.127:22-10.0.0.1:47612.service: Deactivated successfully. May 8 00:53:04.804321 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:53:04.804928 systemd-logind[1205]: Session 19 logged out. Waiting for processes to exit. May 8 00:53:04.806200 systemd[1]: Started sshd@19-10.0.0.127:22-10.0.0.1:47614.service. May 8 00:53:04.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.127:22-10.0.0.1:47614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:04.807329 systemd-logind[1205]: Removed session 19. May 8 00:53:04.845000 audit[5087]: USER_ACCT pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.847292 sshd[5087]: Accepted publickey for core from 10.0.0.1 port 47614 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:04.846000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.846000 audit[5087]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca9e1b90 a2=3 a3=1 items=0 ppid=1 pid=5087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:04.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:04.848549 sshd[5087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:04.852236 systemd-logind[1205]: New session 20 of user core. May 8 00:53:04.852812 systemd[1]: Started session-20.scope. May 8 00:53:04.855000 audit[5087]: USER_START pid=5087 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.856000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.994062 sshd[5087]: pam_unix(sshd:session): session closed for user core May 8 00:53:04.993000 audit[5087]: USER_END pid=5087 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.993000 audit[5087]: CRED_DISP pid=5087 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:04.996817 systemd[1]: sshd@19-10.0.0.127:22-10.0.0.1:47614.service: Deactivated successfully. May 8 00:53:04.997620 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:53:04.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.127:22-10.0.0.1:47614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:04.998150 systemd-logind[1205]: Session 20 logged out. Waiting for processes to exit. May 8 00:53:04.998922 systemd-logind[1205]: Removed session 20. May 8 00:53:09.382000 audit[5100]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.386911 kernel: kauditd_printk_skb: 57 callbacks suppressed May 8 00:53:09.387000 kernel: audit: type=1325 audit(1746665589.382:1479): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.387030 kernel: audit: type=1300 audit(1746665589.382:1479): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe0aab0e0 a2=0 a3=1 items=0 ppid=2220 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.382000 audit[5100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe0aab0e0 a2=0 a3=1 items=0 ppid=2220 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:09.392071 kernel: audit: type=1327 audit(1746665589.382:1479): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:09.393000 audit[5100]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.393000 audit[5100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe0aab0e0 a2=0 a3=1 items=0 ppid=2220 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.400683 kernel: audit: type=1325 audit(1746665589.393:1480): table=nat:124 family=2 entries=106 op=nft_register_chain pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:09.400721 kernel: audit: type=1300 audit(1746665589.393:1480): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe0aab0e0 a2=0 a3=1 items=0 ppid=2220 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:09.400747 kernel: audit: type=1327 audit(1746665589.393:1480): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:09.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:09.998959 systemd[1]: Started sshd@20-10.0.0.127:22-10.0.0.1:47630.service. May 8 00:53:09.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:47630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:10.002424 kernel: audit: type=1130 audit(1746665589.997:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:47630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:10.037000 audit[5103]: USER_ACCT pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.039516 sshd[5103]: Accepted publickey for core from 10.0.0.1 port 47630 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:10.041000 sshd[5103]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:10.039000 audit[5103]: CRED_ACQ pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.045317 kernel: audit: type=1101 audit(1746665590.037:1482): pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.046760 kernel: audit: type=1103 audit(1746665590.039:1483): pid=5103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.046809 kernel: audit: type=1006 audit(1746665590.039:1484): pid=5103 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 8 00:53:10.045577 systemd-logind[1205]: New session 21 of user core. May 8 00:53:10.039000 audit[5103]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdeac2b00 a2=3 a3=1 items=0 ppid=1 pid=5103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:10.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:10.046335 systemd[1]: Started session-21.scope. May 8 00:53:10.048000 audit[5103]: USER_START pid=5103 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.049000 audit[5105]: CRED_ACQ pid=5105 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.164185 sshd[5103]: pam_unix(sshd:session): session closed for user core May 8 00:53:10.163000 audit[5103]: USER_END pid=5103 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.163000 audit[5103]: CRED_DISP pid=5103 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:10.166818 systemd[1]: sshd@20-10.0.0.127:22-10.0.0.1:47630.service: Deactivated successfully. May 8 00:53:10.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:47630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:10.167651 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:53:10.168164 systemd-logind[1205]: Session 21 logged out. Waiting for processes to exit. May 8 00:53:10.168781 systemd-logind[1205]: Removed session 21. May 8 00:53:11.020305 kubelet[2057]: E0508 00:53:11.020260 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:12.897970 kubelet[2057]: I0508 00:53:12.897924 2057 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:53:12.932000 audit[5123]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.932000 audit[5123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc00f280 a2=0 a3=1 items=0 ppid=2220 pid=5123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:12.939000 audit[5123]: NETFILTER_CFG table=nat:126 family=2 entries=58 op=nft_register_chain pid=5123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:53:12.939000 audit[5123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=fffffc00f280 a2=0 a3=1 items=0 ppid=2220 pid=5123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:12.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:53:14.880000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.881498 kernel: kauditd_printk_skb: 13 callbacks suppressed May 8 00:53:14.881576 kernel: audit: type=1400 audit(1746665594.880:1492): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.880000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.887787 kernel: audit: type=1400 audit(1746665594.880:1493): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.887854 kernel: audit: type=1300 audit(1746665594.880:1493): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0a740 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.880000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0a740 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.895032 kernel: audit: type=1327 audit(1746665594.880:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.895113 kernel: audit: type=1400 audit(1746665594.881:1494): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.881000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.881000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d0a840 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.901816 kernel: audit: type=1300 audit(1746665594.881:1494): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d0a840 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.901887 kernel: audit: type=1327 audit(1746665594.881:1494): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.880000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d0a720 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.908867 kernel: audit: type=1300 audit(1746665594.880:1492): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d0a720 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.908939 kernel: audit: type=1327 audit(1746665594.880:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:14.882000 audit[1924]: AVC avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.914959 kernel: audit: type=1400 audit(1746665594.882:1495): avc: denied { watch } for pid=1924 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:53:14.882000 audit[1924]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40035a7aa0 a2=fc6 a3=0 items=0 ppid=1777 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c967 key=(null) May 8 00:53:14.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:53:15.167889 systemd[1]: Started sshd@21-10.0.0.127:22-10.0.0.1:53918.service. May 8 00:53:15.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.127:22-10.0.0.1:53918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:15.206000 audit[5125]: USER_ACCT pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.207884 sshd[5125]: Accepted publickey for core from 10.0.0.1 port 53918 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:15.207000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.207000 audit[5125]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7190880 a2=3 a3=1 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:15.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:15.209000 sshd[5125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:15.212449 systemd-logind[1205]: New session 22 of user core. May 8 00:53:15.212792 systemd[1]: Started session-22.scope. May 8 00:53:15.214000 audit[5125]: USER_START pid=5125 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.215000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.331371 sshd[5125]: pam_unix(sshd:session): session closed for user core May 8 00:53:15.330000 audit[5125]: USER_END pid=5125 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.331000 audit[5125]: CRED_DISP pid=5125 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:15.334122 systemd-logind[1205]: Session 22 logged out. Waiting for processes to exit. May 8 00:53:15.334340 systemd[1]: sshd@21-10.0.0.127:22-10.0.0.1:53918.service: Deactivated successfully. May 8 00:53:15.335062 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:53:15.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.127:22-10.0.0.1:53918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:15.335717 systemd-logind[1205]: Removed session 22. May 8 00:53:20.336153 systemd[1]: Started sshd@22-10.0.0.127:22-10.0.0.1:53926.service. May 8 00:53:20.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:20.337117 kernel: kauditd_printk_skb: 13 callbacks suppressed May 8 00:53:20.337181 kernel: audit: type=1130 audit(1746665600.334:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:20.386000 audit[5141]: USER_ACCT pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.387916 sshd[5141]: Accepted publickey for core from 10.0.0.1 port 53926 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:20.388883 sshd[5141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:20.387000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.394824 kernel: audit: type=1101 audit(1746665600.386:1506): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.394908 kernel: audit: type=1103 audit(1746665600.387:1507): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.394943 kernel: audit: type=1006 audit(1746665600.387:1508): pid=5141 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 8 00:53:20.394459 systemd-logind[1205]: New session 23 of user core. May 8 00:53:20.394702 systemd[1]: Started session-23.scope. May 8 00:53:20.395855 kernel: audit: type=1300 audit(1746665600.387:1508): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbcf49f0 a2=3 a3=1 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.387000 audit[5141]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbcf49f0 a2=3 a3=1 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:20.387000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:20.400209 kernel: audit: type=1327 audit(1746665600.387:1508): proctitle=737368643A20636F7265205B707269765D May 8 00:53:20.400267 kernel: audit: type=1105 audit(1746665600.397:1509): pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.397000 audit[5141]: USER_START pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.399000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.406474 kernel: audit: type=1103 audit(1746665600.399:1510): pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.529576 sshd[5141]: pam_unix(sshd:session): session closed for user core May 8 00:53:20.528000 audit[5141]: USER_END pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.532088 systemd[1]: sshd@22-10.0.0.127:22-10.0.0.1:53926.service: Deactivated successfully. May 8 00:53:20.532853 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:53:20.533589 systemd-logind[1205]: Session 23 logged out. Waiting for processes to exit. May 8 00:53:20.529000 audit[5141]: CRED_DISP pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.534311 systemd-logind[1205]: Removed session 23. May 8 00:53:20.536815 kernel: audit: type=1106 audit(1746665600.528:1511): pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.536886 kernel: audit: type=1104 audit(1746665600.529:1512): pid=5141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:20.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:22.019729 kubelet[2057]: E0508 00:53:22.019694 2057 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:53:25.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:25.534643 systemd[1]: Started sshd@23-10.0.0.127:22-10.0.0.1:52402.service. May 8 00:53:25.535525 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:53:25.535570 kernel: audit: type=1130 audit(1746665605.534:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:53:25.575000 audit[5183]: USER_ACCT pid=5183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.576230 sshd[5183]: Accepted publickey for core from 10.0.0.1 port 52402 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:53:25.577358 sshd[5183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:53:25.576000 audit[5183]: CRED_ACQ pid=5183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.582711 kernel: audit: type=1101 audit(1746665605.575:1515): pid=5183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.582783 kernel: audit: type=1103 audit(1746665605.576:1516): pid=5183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.582805 kernel: audit: type=1006 audit(1746665605.576:1517): pid=5183 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 8 00:53:25.581722 systemd[1]: Started session-24.scope. May 8 00:53:25.581987 systemd-logind[1205]: New session 24 of user core. May 8 00:53:25.584290 kernel: audit: type=1300 audit(1746665605.576:1517): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4c99d20 a2=3 a3=1 items=0 ppid=1 pid=5183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:25.576000 audit[5183]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4c99d20 a2=3 a3=1 items=0 ppid=1 pid=5183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:53:25.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:53:25.588723 kernel: audit: type=1327 audit(1746665605.576:1517): proctitle=737368643A20636F7265205B707269765D May 8 00:53:25.588792 kernel: audit: type=1105 audit(1746665605.587:1518): pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.587000 audit[5183]: USER_START pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.588000 audit[5185]: CRED_ACQ pid=5185 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.595624 kernel: audit: type=1103 audit(1746665605.588:1519): pid=5185 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.699378 sshd[5183]: pam_unix(sshd:session): session closed for user core May 8 00:53:25.699000 audit[5183]: USER_END pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.702845 systemd[1]: sshd@23-10.0.0.127:22-10.0.0.1:52402.service: Deactivated successfully. May 8 00:53:25.703647 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:53:25.699000 audit[5183]: CRED_DISP pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.704614 systemd-logind[1205]: Session 24 logged out. Waiting for processes to exit. May 8 00:53:25.705468 systemd-logind[1205]: Removed session 24. May 8 00:53:25.706750 kernel: audit: type=1106 audit(1746665605.699:1520): pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.706812 kernel: audit: type=1104 audit(1746665605.699:1521): pid=5183 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:53:25.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'