May 8 00:38:01.754124 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 8 00:38:01.754146 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed May 7 23:24:31 -00 2025 May 8 00:38:01.754154 kernel: efi: EFI v2.70 by EDK II May 8 00:38:01.754160 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 8 00:38:01.754166 kernel: random: crng init done May 8 00:38:01.754171 kernel: ACPI: Early table checksum verification disabled May 8 00:38:01.754178 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 8 00:38:01.754185 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 8 00:38:01.754190 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754196 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754206 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754212 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754217 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754223 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754231 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754237 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754243 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:38:01.754248 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 8 00:38:01.754254 kernel: NUMA: Failed to initialise from firmware May 8 00:38:01.754260 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:38:01.754265 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] May 8 00:38:01.754271 kernel: Zone ranges: May 8 00:38:01.754277 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:38:01.754283 kernel: DMA32 empty May 8 00:38:01.754289 kernel: Normal empty May 8 00:38:01.754295 kernel: Movable zone start for each node May 8 00:38:01.754300 kernel: Early memory node ranges May 8 00:38:01.754306 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 8 00:38:01.754312 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 8 00:38:01.754318 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 8 00:38:01.754323 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 8 00:38:01.754329 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 8 00:38:01.754335 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 8 00:38:01.754340 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 8 00:38:01.754346 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:38:01.754353 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 8 00:38:01.754359 kernel: psci: probing for conduit method from ACPI. May 8 00:38:01.754365 kernel: psci: PSCIv1.1 detected in firmware. May 8 00:38:01.754388 kernel: psci: Using standard PSCI v0.2 function IDs May 8 00:38:01.754394 kernel: psci: Trusted OS migration not required May 8 00:38:01.754403 kernel: psci: SMC Calling Convention v1.1 May 8 00:38:01.754409 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 8 00:38:01.754416 kernel: ACPI: SRAT not present May 8 00:38:01.754423 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 8 00:38:01.754429 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 8 00:38:01.754435 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 8 00:38:01.754441 kernel: Detected PIPT I-cache on CPU0 May 8 00:38:01.754447 kernel: CPU features: detected: GIC system register CPU interface May 8 00:38:01.754454 kernel: CPU features: detected: Hardware dirty bit management May 8 00:38:01.754460 kernel: CPU features: detected: Spectre-v4 May 8 00:38:01.754466 kernel: CPU features: detected: Spectre-BHB May 8 00:38:01.754473 kernel: CPU features: kernel page table isolation forced ON by KASLR May 8 00:38:01.754480 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 8 00:38:01.754486 kernel: CPU features: detected: ARM erratum 1418040 May 8 00:38:01.754492 kernel: CPU features: detected: SSBS not fully self-synchronizing May 8 00:38:01.754498 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 8 00:38:01.754504 kernel: Policy zone: DMA May 8 00:38:01.754511 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:38:01.754518 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:38:01.754524 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:38:01.754530 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:38:01.754536 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:38:01.754544 kernel: Memory: 2457400K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114888K reserved, 0K cma-reserved) May 8 00:38:01.754551 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:38:01.754557 kernel: trace event string verifier disabled May 8 00:38:01.754563 kernel: rcu: Preemptible hierarchical RCU implementation. May 8 00:38:01.754570 kernel: rcu: RCU event tracing is enabled. May 8 00:38:01.754576 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:38:01.754583 kernel: Trampoline variant of Tasks RCU enabled. May 8 00:38:01.754589 kernel: Tracing variant of Tasks RCU enabled. May 8 00:38:01.754595 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:38:01.754602 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:38:01.754608 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 8 00:38:01.754615 kernel: GICv3: 256 SPIs implemented May 8 00:38:01.754621 kernel: GICv3: 0 Extended SPIs implemented May 8 00:38:01.754627 kernel: GICv3: Distributor has no Range Selector support May 8 00:38:01.754633 kernel: Root IRQ handler: gic_handle_irq May 8 00:38:01.754640 kernel: GICv3: 16 PPIs implemented May 8 00:38:01.754646 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 8 00:38:01.754652 kernel: ACPI: SRAT not present May 8 00:38:01.754658 kernel: ITS [mem 0x08080000-0x0809ffff] May 8 00:38:01.754664 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 8 00:38:01.754671 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 8 00:38:01.754677 kernel: GICv3: using LPI property table @0x00000000400d0000 May 8 00:38:01.754683 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 8 00:38:01.754691 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:38:01.754697 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 8 00:38:01.754704 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 8 00:38:01.754710 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 8 00:38:01.754716 kernel: arm-pv: using stolen time PV May 8 00:38:01.754723 kernel: Console: colour dummy device 80x25 May 8 00:38:01.754729 kernel: ACPI: Core revision 20210730 May 8 00:38:01.754736 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 8 00:38:01.754750 kernel: pid_max: default: 32768 minimum: 301 May 8 00:38:01.754757 kernel: LSM: Security Framework initializing May 8 00:38:01.754764 kernel: SELinux: Initializing. May 8 00:38:01.754770 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:38:01.754777 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:38:01.754783 kernel: rcu: Hierarchical SRCU implementation. May 8 00:38:01.754790 kernel: Platform MSI: ITS@0x8080000 domain created May 8 00:38:01.754796 kernel: PCI/MSI: ITS@0x8080000 domain created May 8 00:38:01.754803 kernel: Remapping and enabling EFI services. May 8 00:38:01.754809 kernel: smp: Bringing up secondary CPUs ... May 8 00:38:01.754816 kernel: Detected PIPT I-cache on CPU1 May 8 00:38:01.754823 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 8 00:38:01.754830 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 8 00:38:01.754837 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:38:01.754843 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 8 00:38:01.754849 kernel: Detected PIPT I-cache on CPU2 May 8 00:38:01.754856 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 8 00:38:01.754863 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 8 00:38:01.754870 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:38:01.754876 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 8 00:38:01.754883 kernel: Detected PIPT I-cache on CPU3 May 8 00:38:01.754890 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 8 00:38:01.754896 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 8 00:38:01.754903 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:38:01.754910 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 8 00:38:01.754921 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:38:01.754930 kernel: SMP: Total of 4 processors activated. May 8 00:38:01.754936 kernel: CPU features: detected: 32-bit EL0 Support May 8 00:38:01.754944 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 8 00:38:01.754950 kernel: CPU features: detected: Common not Private translations May 8 00:38:01.754957 kernel: CPU features: detected: CRC32 instructions May 8 00:38:01.754964 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 8 00:38:01.754971 kernel: CPU features: detected: LSE atomic instructions May 8 00:38:01.754979 kernel: CPU features: detected: Privileged Access Never May 8 00:38:01.754986 kernel: CPU features: detected: RAS Extension Support May 8 00:38:01.754993 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 8 00:38:01.754999 kernel: CPU: All CPU(s) started at EL1 May 8 00:38:01.755006 kernel: alternatives: patching kernel code May 8 00:38:01.755014 kernel: devtmpfs: initialized May 8 00:38:01.755020 kernel: KASLR enabled May 8 00:38:01.755028 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:38:01.755034 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:38:01.755041 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:38:01.755048 kernel: SMBIOS 3.0.0 present. May 8 00:38:01.755055 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 8 00:38:01.755062 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:38:01.755069 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 8 00:38:01.755077 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 8 00:38:01.755084 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 8 00:38:01.755091 kernel: audit: initializing netlink subsys (disabled) May 8 00:38:01.755099 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 May 8 00:38:01.755105 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:38:01.755130 kernel: cpuidle: using governor menu May 8 00:38:01.755136 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 8 00:38:01.755143 kernel: ASID allocator initialised with 32768 entries May 8 00:38:01.755150 kernel: ACPI: bus type PCI registered May 8 00:38:01.755158 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:38:01.755165 kernel: Serial: AMBA PL011 UART driver May 8 00:38:01.755172 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:38:01.755179 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 8 00:38:01.755186 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:38:01.755193 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 8 00:38:01.755200 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:38:01.755206 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 8 00:38:01.755213 kernel: ACPI: Added _OSI(Module Device) May 8 00:38:01.755221 kernel: ACPI: Added _OSI(Processor Device) May 8 00:38:01.755228 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:38:01.755234 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:38:01.755241 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:38:01.755248 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:38:01.755254 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:38:01.755261 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:38:01.755268 kernel: ACPI: Interpreter enabled May 8 00:38:01.755274 kernel: ACPI: Using GIC for interrupt routing May 8 00:38:01.755283 kernel: ACPI: MCFG table detected, 1 entries May 8 00:38:01.755290 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 8 00:38:01.755296 kernel: printk: console [ttyAMA0] enabled May 8 00:38:01.755303 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:38:01.755550 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:38:01.755661 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 8 00:38:01.755731 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 8 00:38:01.755795 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 8 00:38:01.755905 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 8 00:38:01.755916 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 8 00:38:01.755924 kernel: PCI host bridge to bus 0000:00 May 8 00:38:01.756000 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 8 00:38:01.756057 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 8 00:38:01.756111 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 8 00:38:01.756185 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:38:01.756262 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 8 00:38:01.756340 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:38:01.756436 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 8 00:38:01.756500 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 8 00:38:01.756562 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:38:01.756624 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:38:01.756688 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 8 00:38:01.756751 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 8 00:38:01.756809 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 8 00:38:01.756865 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 8 00:38:01.756921 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 8 00:38:01.756930 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 8 00:38:01.756938 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 8 00:38:01.756945 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 8 00:38:01.756954 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 8 00:38:01.756961 kernel: iommu: Default domain type: Translated May 8 00:38:01.756968 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 8 00:38:01.756975 kernel: vgaarb: loaded May 8 00:38:01.756982 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:38:01.756989 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:38:01.756996 kernel: PTP clock support registered May 8 00:38:01.757003 kernel: Registered efivars operations May 8 00:38:01.757010 kernel: clocksource: Switched to clocksource arch_sys_counter May 8 00:38:01.757019 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:38:01.757026 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:38:01.757033 kernel: pnp: PnP ACPI init May 8 00:38:01.757103 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 8 00:38:01.757113 kernel: pnp: PnP ACPI: found 1 devices May 8 00:38:01.757120 kernel: NET: Registered PF_INET protocol family May 8 00:38:01.757127 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:38:01.757134 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:38:01.757142 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:38:01.757149 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:38:01.757156 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:38:01.757164 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:38:01.757171 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:38:01.757178 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:38:01.757184 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:38:01.757191 kernel: PCI: CLS 0 bytes, default 64 May 8 00:38:01.757198 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 8 00:38:01.757206 kernel: kvm [1]: HYP mode not available May 8 00:38:01.757213 kernel: Initialise system trusted keyrings May 8 00:38:01.757220 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:38:01.757227 kernel: Key type asymmetric registered May 8 00:38:01.757234 kernel: Asymmetric key parser 'x509' registered May 8 00:38:01.757240 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:38:01.757247 kernel: io scheduler mq-deadline registered May 8 00:38:01.757254 kernel: io scheduler kyber registered May 8 00:38:01.757261 kernel: io scheduler bfq registered May 8 00:38:01.757269 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 8 00:38:01.757276 kernel: ACPI: button: Power Button [PWRB] May 8 00:38:01.757284 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 8 00:38:01.757346 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 8 00:38:01.757355 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:38:01.757362 kernel: thunder_xcv, ver 1.0 May 8 00:38:01.757382 kernel: thunder_bgx, ver 1.0 May 8 00:38:01.757389 kernel: nicpf, ver 1.0 May 8 00:38:01.757396 kernel: nicvf, ver 1.0 May 8 00:38:01.757474 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 8 00:38:01.757534 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-08T00:38:01 UTC (1746664681) May 8 00:38:01.757543 kernel: hid: raw HID events driver (C) Jiri Kosina May 8 00:38:01.757550 kernel: NET: Registered PF_INET6 protocol family May 8 00:38:01.757557 kernel: Segment Routing with IPv6 May 8 00:38:01.757563 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:38:01.757570 kernel: NET: Registered PF_PACKET protocol family May 8 00:38:01.757577 kernel: Key type dns_resolver registered May 8 00:38:01.757585 kernel: registered taskstats version 1 May 8 00:38:01.757592 kernel: Loading compiled-in X.509 certificates May 8 00:38:01.757599 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: 47302b466ab2df930dd804d2ee9c8ab44de4e2dc' May 8 00:38:01.757606 kernel: Key type .fscrypt registered May 8 00:38:01.757612 kernel: Key type fscrypt-provisioning registered May 8 00:38:01.757619 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:38:01.757626 kernel: ima: Allocated hash algorithm: sha1 May 8 00:38:01.757648 kernel: ima: No architecture policies found May 8 00:38:01.757656 kernel: clk: Disabling unused clocks May 8 00:38:01.757665 kernel: Freeing unused kernel memory: 36416K May 8 00:38:01.757671 kernel: Run /init as init process May 8 00:38:01.757678 kernel: with arguments: May 8 00:38:01.757684 kernel: /init May 8 00:38:01.757691 kernel: with environment: May 8 00:38:01.757697 kernel: HOME=/ May 8 00:38:01.757704 kernel: TERM=linux May 8 00:38:01.757710 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:38:01.757719 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:38:01.757730 systemd[1]: Detected virtualization kvm. May 8 00:38:01.757737 systemd[1]: Detected architecture arm64. May 8 00:38:01.757744 systemd[1]: Running in initrd. May 8 00:38:01.757751 systemd[1]: No hostname configured, using default hostname. May 8 00:38:01.757759 systemd[1]: Hostname set to . May 8 00:38:01.757766 systemd[1]: Initializing machine ID from VM UUID. May 8 00:38:01.757773 systemd[1]: Queued start job for default target initrd.target. May 8 00:38:01.757782 systemd[1]: Started systemd-ask-password-console.path. May 8 00:38:01.757790 systemd[1]: Reached target cryptsetup.target. May 8 00:38:01.757797 systemd[1]: Reached target paths.target. May 8 00:38:01.757804 systemd[1]: Reached target slices.target. May 8 00:38:01.757811 systemd[1]: Reached target swap.target. May 8 00:38:01.757819 systemd[1]: Reached target timers.target. May 8 00:38:01.757826 systemd[1]: Listening on iscsid.socket. May 8 00:38:01.757838 systemd[1]: Listening on iscsiuio.socket. May 8 00:38:01.757849 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:38:01.757857 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:38:01.757864 systemd[1]: Listening on systemd-journald.socket. May 8 00:38:01.757872 systemd[1]: Listening on systemd-networkd.socket. May 8 00:38:01.757880 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:38:01.757887 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:38:01.757894 systemd[1]: Reached target sockets.target. May 8 00:38:01.757902 systemd[1]: Starting kmod-static-nodes.service... May 8 00:38:01.757910 systemd[1]: Finished network-cleanup.service. May 8 00:38:01.757918 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:38:01.757925 systemd[1]: Starting systemd-journald.service... May 8 00:38:01.757932 systemd[1]: Starting systemd-modules-load.service... May 8 00:38:01.757940 systemd[1]: Starting systemd-resolved.service... May 8 00:38:01.757947 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:38:01.757954 systemd[1]: Finished kmod-static-nodes.service. May 8 00:38:01.757961 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:38:01.757969 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:38:01.757977 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:38:01.757985 kernel: audit: type=1130 audit(1746664681.752:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.757992 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:38:01.758000 kernel: audit: type=1130 audit(1746664681.757:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.758011 systemd-journald[289]: Journal started May 8 00:38:01.758057 systemd-journald[289]: Runtime Journal (/run/log/journal/721ea5737b804e749b4782ad29a0723e) is 6.0M, max 48.7M, 42.6M free. May 8 00:38:01.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.749098 systemd-modules-load[290]: Inserted module 'overlay' May 8 00:38:01.761817 systemd[1]: Started systemd-journald.service. May 8 00:38:01.760319 systemd-resolved[291]: Positive Trust Anchors: May 8 00:38:01.765554 kernel: audit: type=1130 audit(1746664681.762:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.760327 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:38:01.770032 kernel: audit: type=1130 audit(1746664681.765:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.760353 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:38:01.764471 systemd-resolved[291]: Defaulting to hostname 'linux'. May 8 00:38:01.765622 systemd[1]: Started systemd-resolved.service. May 8 00:38:01.766572 systemd[1]: Reached target nss-lookup.target. May 8 00:38:01.780745 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:38:01.771558 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:38:01.784411 kernel: Bridge firewalling registered May 8 00:38:01.784217 systemd-modules-load[290]: Inserted module 'br_netfilter' May 8 00:38:01.792160 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:38:01.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.793996 systemd[1]: Starting dracut-cmdline.service... May 8 00:38:01.797784 kernel: audit: type=1130 audit(1746664681.792:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.799401 kernel: SCSI subsystem initialized May 8 00:38:01.806204 dracut-cmdline[306]: dracut-dracut-053 May 8 00:38:01.808171 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:38:01.808189 kernel: device-mapper: uevent: version 1.0.3 May 8 00:38:01.808198 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:38:01.808574 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:38:01.817884 systemd-modules-load[290]: Inserted module 'dm_multipath' May 8 00:38:01.819046 systemd[1]: Finished systemd-modules-load.service. May 8 00:38:01.820887 systemd[1]: Starting systemd-sysctl.service... May 8 00:38:01.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.826096 kernel: audit: type=1130 audit(1746664681.818:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.831527 systemd[1]: Finished systemd-sysctl.service. May 8 00:38:01.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.836682 kernel: audit: type=1130 audit(1746664681.831:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.887397 kernel: Loading iSCSI transport class v2.0-870. May 8 00:38:01.906406 kernel: iscsi: registered transport (tcp) May 8 00:38:01.921404 kernel: iscsi: registered transport (qla4xxx) May 8 00:38:01.921441 kernel: QLogic iSCSI HBA Driver May 8 00:38:01.954794 systemd[1]: Finished dracut-cmdline.service. May 8 00:38:01.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:01.956458 systemd[1]: Starting dracut-pre-udev.service... May 8 00:38:01.959815 kernel: audit: type=1130 audit(1746664681.955:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.000406 kernel: raid6: neonx8 gen() 13787 MB/s May 8 00:38:02.017392 kernel: raid6: neonx8 xor() 10768 MB/s May 8 00:38:02.034396 kernel: raid6: neonx4 gen() 13467 MB/s May 8 00:38:02.051392 kernel: raid6: neonx4 xor() 11194 MB/s May 8 00:38:02.068393 kernel: raid6: neonx2 gen() 12912 MB/s May 8 00:38:02.085395 kernel: raid6: neonx2 xor() 10579 MB/s May 8 00:38:02.102394 kernel: raid6: neonx1 gen() 10454 MB/s May 8 00:38:02.119436 kernel: raid6: neonx1 xor() 8717 MB/s May 8 00:38:02.136412 kernel: raid6: int64x8 gen() 6227 MB/s May 8 00:38:02.153397 kernel: raid6: int64x8 xor() 3536 MB/s May 8 00:38:02.170399 kernel: raid6: int64x4 gen() 7208 MB/s May 8 00:38:02.187398 kernel: raid6: int64x4 xor() 3852 MB/s May 8 00:38:02.204397 kernel: raid6: int64x2 gen() 6145 MB/s May 8 00:38:02.221397 kernel: raid6: int64x2 xor() 3317 MB/s May 8 00:38:02.238396 kernel: raid6: int64x1 gen() 5043 MB/s May 8 00:38:02.255485 kernel: raid6: int64x1 xor() 2643 MB/s May 8 00:38:02.255495 kernel: raid6: using algorithm neonx8 gen() 13787 MB/s May 8 00:38:02.255504 kernel: raid6: .... xor() 10768 MB/s, rmw enabled May 8 00:38:02.256591 kernel: raid6: using neon recovery algorithm May 8 00:38:02.267835 kernel: xor: measuring software checksum speed May 8 00:38:02.267852 kernel: 8regs : 17235 MB/sec May 8 00:38:02.267860 kernel: 32regs : 20728 MB/sec May 8 00:38:02.268486 kernel: arm64_neon : 27542 MB/sec May 8 00:38:02.268496 kernel: xor: using function: arm64_neon (27542 MB/sec) May 8 00:38:02.321403 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 8 00:38:02.331647 systemd[1]: Finished dracut-pre-udev.service. May 8 00:38:02.335486 kernel: audit: type=1130 audit(1746664682.332:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.335000 audit: BPF prog-id=7 op=LOAD May 8 00:38:02.335000 audit: BPF prog-id=8 op=LOAD May 8 00:38:02.335848 systemd[1]: Starting systemd-udevd.service... May 8 00:38:02.349819 systemd-udevd[491]: Using default interface naming scheme 'v252'. May 8 00:38:02.353129 systemd[1]: Started systemd-udevd.service. May 8 00:38:02.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.355065 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:38:02.366431 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 8 00:38:02.391787 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:38:02.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.393258 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:38:02.429404 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:38:02.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:02.464391 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:38:02.469230 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:38:02.469243 kernel: GPT:9289727 != 19775487 May 8 00:38:02.469252 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:38:02.469261 kernel: GPT:9289727 != 19775487 May 8 00:38:02.469268 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:38:02.469277 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:38:02.487401 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (544) May 8 00:38:02.488352 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:38:02.489344 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:38:02.496775 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:38:02.500648 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:38:02.504095 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:38:02.505805 systemd[1]: Starting disk-uuid.service... May 8 00:38:02.511827 disk-uuid[562]: Primary Header is updated. May 8 00:38:02.511827 disk-uuid[562]: Secondary Entries is updated. May 8 00:38:02.511827 disk-uuid[562]: Secondary Header is updated. May 8 00:38:02.514893 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:38:03.526407 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:38:03.526460 disk-uuid[563]: The operation has completed successfully. May 8 00:38:03.549324 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:38:03.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.549430 systemd[1]: Finished disk-uuid.service. May 8 00:38:03.550941 systemd[1]: Starting verity-setup.service... May 8 00:38:03.566394 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 8 00:38:03.585153 systemd[1]: Found device dev-mapper-usr.device. May 8 00:38:03.587186 systemd[1]: Mounting sysusr-usr.mount... May 8 00:38:03.589959 systemd[1]: Finished verity-setup.service. May 8 00:38:03.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.636316 systemd[1]: Mounted sysusr-usr.mount. May 8 00:38:03.637650 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:38:03.637156 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:38:03.637756 systemd[1]: Starting ignition-setup.service... May 8 00:38:03.640129 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:38:03.647146 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:38:03.647180 kernel: BTRFS info (device vda6): using free space tree May 8 00:38:03.647191 kernel: BTRFS info (device vda6): has skinny extents May 8 00:38:03.653702 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:38:03.660205 systemd[1]: Finished ignition-setup.service. May 8 00:38:03.661671 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:38:03.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.718176 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:38:03.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.719000 audit: BPF prog-id=9 op=LOAD May 8 00:38:03.720302 systemd[1]: Starting systemd-networkd.service... May 8 00:38:03.738131 ignition[649]: Ignition 2.14.0 May 8 00:38:03.738140 ignition[649]: Stage: fetch-offline May 8 00:38:03.738177 ignition[649]: no configs at "/usr/lib/ignition/base.d" May 8 00:38:03.738186 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:03.738333 ignition[649]: parsed url from cmdline: "" May 8 00:38:03.738336 ignition[649]: no config URL provided May 8 00:38:03.738341 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:38:03.738347 ignition[649]: no config at "/usr/lib/ignition/user.ign" May 8 00:38:03.738390 ignition[649]: op(1): [started] loading QEMU firmware config module May 8 00:38:03.738396 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:38:03.743231 ignition[649]: op(1): [finished] loading QEMU firmware config module May 8 00:38:03.743251 ignition[649]: QEMU firmware config was not found. Ignoring... May 8 00:38:03.750051 systemd-networkd[741]: lo: Link UP May 8 00:38:03.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.750054 systemd-networkd[741]: lo: Gained carrier May 8 00:38:03.750608 systemd-networkd[741]: Enumeration completed May 8 00:38:03.750698 systemd[1]: Started systemd-networkd.service. May 8 00:38:03.750945 systemd-networkd[741]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:38:03.751807 systemd[1]: Reached target network.target. May 8 00:38:03.752182 systemd-networkd[741]: eth0: Link UP May 8 00:38:03.752186 systemd-networkd[741]: eth0: Gained carrier May 8 00:38:03.753798 systemd[1]: Starting iscsiuio.service... May 8 00:38:03.764062 systemd[1]: Started iscsiuio.service. May 8 00:38:03.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.765766 systemd[1]: Starting iscsid.service... May 8 00:38:03.768763 iscsid[748]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:38:03.768763 iscsid[748]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:38:03.768763 iscsid[748]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:38:03.768763 iscsid[748]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:38:03.768763 iscsid[748]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:38:03.768763 iscsid[748]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:38:03.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.771603 systemd[1]: Started iscsid.service. May 8 00:38:03.777317 systemd[1]: Starting dracut-initqueue.service... May 8 00:38:03.783451 systemd-networkd[741]: eth0: DHCPv4 address 10.0.0.58/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:38:03.787136 systemd[1]: Finished dracut-initqueue.service. May 8 00:38:03.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.788155 systemd[1]: Reached target remote-fs-pre.target. May 8 00:38:03.789739 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:38:03.791384 systemd[1]: Reached target remote-fs.target. May 8 00:38:03.793601 systemd[1]: Starting dracut-pre-mount.service... May 8 00:38:03.800651 systemd[1]: Finished dracut-pre-mount.service. May 8 00:38:03.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.811916 ignition[649]: parsing config with SHA512: c7db1bb8a4392dc239d50817a4bc355d07a3d242d368371ab2f040d87a3557bbe38545e02ab681e5e3d3140c563fc2a8c3b5127ab29a92f1f3dfb34ba1d6a065 May 8 00:38:03.822000 unknown[649]: fetched base config from "system" May 8 00:38:03.822015 unknown[649]: fetched user config from "qemu" May 8 00:38:03.822534 ignition[649]: fetch-offline: fetch-offline passed May 8 00:38:03.824245 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:38:03.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.822934 ignition[649]: Ignition finished successfully May 8 00:38:03.825981 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:38:03.826631 systemd[1]: Starting ignition-kargs.service... May 8 00:38:03.835259 ignition[762]: Ignition 2.14.0 May 8 00:38:03.835268 ignition[762]: Stage: kargs May 8 00:38:03.835356 ignition[762]: no configs at "/usr/lib/ignition/base.d" May 8 00:38:03.835411 ignition[762]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:03.836222 ignition[762]: kargs: kargs passed May 8 00:38:03.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.838396 systemd[1]: Finished ignition-kargs.service. May 8 00:38:03.836261 ignition[762]: Ignition finished successfully May 8 00:38:03.840649 systemd[1]: Starting ignition-disks.service... May 8 00:38:03.846587 ignition[768]: Ignition 2.14.0 May 8 00:38:03.846598 ignition[768]: Stage: disks May 8 00:38:03.846675 ignition[768]: no configs at "/usr/lib/ignition/base.d" May 8 00:38:03.848533 systemd[1]: Finished ignition-disks.service. May 8 00:38:03.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.846684 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:03.850044 systemd[1]: Reached target initrd-root-device.target. May 8 00:38:03.847511 ignition[768]: disks: disks passed May 8 00:38:03.851396 systemd[1]: Reached target local-fs-pre.target. May 8 00:38:03.847548 ignition[768]: Ignition finished successfully May 8 00:38:03.853049 systemd[1]: Reached target local-fs.target. May 8 00:38:03.854425 systemd[1]: Reached target sysinit.target. May 8 00:38:03.855592 systemd[1]: Reached target basic.target. May 8 00:38:03.857566 systemd[1]: Starting systemd-fsck-root.service... May 8 00:38:03.867970 systemd-fsck[776]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 8 00:38:03.871200 systemd[1]: Finished systemd-fsck-root.service. May 8 00:38:03.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.872720 systemd[1]: Mounting sysroot.mount... May 8 00:38:03.878401 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:38:03.878413 systemd[1]: Mounted sysroot.mount. May 8 00:38:03.879109 systemd[1]: Reached target initrd-root-fs.target. May 8 00:38:03.881689 systemd[1]: Mounting sysroot-usr.mount... May 8 00:38:03.882569 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:38:03.882606 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:38:03.882630 systemd[1]: Reached target ignition-diskful.target. May 8 00:38:03.884310 systemd[1]: Mounted sysroot-usr.mount. May 8 00:38:03.886133 systemd[1]: Starting initrd-setup-root.service... May 8 00:38:03.890164 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:38:03.893557 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory May 8 00:38:03.897282 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:38:03.901301 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:38:03.926427 systemd[1]: Finished initrd-setup-root.service. May 8 00:38:03.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.927897 systemd[1]: Starting ignition-mount.service... May 8 00:38:03.929148 systemd[1]: Starting sysroot-boot.service... May 8 00:38:03.933687 bash[827]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:38:03.942065 ignition[829]: INFO : Ignition 2.14.0 May 8 00:38:03.943075 ignition[829]: INFO : Stage: mount May 8 00:38:03.944064 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:38:03.944446 systemd[1]: Finished sysroot-boot.service. May 8 00:38:03.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.946331 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:03.947436 ignition[829]: INFO : mount: mount passed May 8 00:38:03.947436 ignition[829]: INFO : Ignition finished successfully May 8 00:38:03.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:03.947570 systemd[1]: Finished ignition-mount.service. May 8 00:38:04.596238 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:38:04.603148 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) May 8 00:38:04.603179 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:38:04.603189 kernel: BTRFS info (device vda6): using free space tree May 8 00:38:04.604419 kernel: BTRFS info (device vda6): has skinny extents May 8 00:38:04.607177 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:38:04.608774 systemd[1]: Starting ignition-files.service... May 8 00:38:04.621716 ignition[857]: INFO : Ignition 2.14.0 May 8 00:38:04.621716 ignition[857]: INFO : Stage: files May 8 00:38:04.623268 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:38:04.623268 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:04.623268 ignition[857]: DEBUG : files: compiled without relabeling support, skipping May 8 00:38:04.626592 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:38:04.626592 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:38:04.629750 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:38:04.631055 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:38:04.632465 unknown[857]: wrote ssh authorized keys file for user: core May 8 00:38:04.633553 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:38:04.633553 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 8 00:38:04.633553 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 8 00:38:04.751650 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:38:04.986550 systemd-networkd[741]: eth0: Gained IPv6LL May 8 00:38:05.527498 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 8 00:38:05.529226 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 8 00:38:05.530848 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 8 00:38:05.829106 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:38:06.293080 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 8 00:38:06.293080 ignition[857]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:38:06.296770 ignition[857]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:38:06.352880 ignition[857]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:38:06.355304 ignition[857]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:38:06.355304 ignition[857]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 8 00:38:06.355304 ignition[857]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:38:06.355304 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:38:06.355304 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:38:06.355304 ignition[857]: INFO : files: files passed May 8 00:38:06.355304 ignition[857]: INFO : Ignition finished successfully May 8 00:38:06.378120 kernel: kauditd_printk_skb: 23 callbacks suppressed May 8 00:38:06.378143 kernel: audit: type=1130 audit(1746664686.357:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.378162 kernel: audit: type=1130 audit(1746664686.366:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.378172 kernel: audit: type=1131 audit(1746664686.366:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.378181 kernel: audit: type=1130 audit(1746664686.373:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.355487 systemd[1]: Finished ignition-files.service. May 8 00:38:06.358324 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:38:06.380428 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:38:06.362319 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:38:06.383565 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:38:06.362979 systemd[1]: Starting ignition-quench.service... May 8 00:38:06.365554 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:38:06.365635 systemd[1]: Finished ignition-quench.service. May 8 00:38:06.367278 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:38:06.373819 systemd[1]: Reached target ignition-complete.target. May 8 00:38:06.378012 systemd[1]: Starting initrd-parse-etc.service... May 8 00:38:06.389846 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:38:06.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.389926 systemd[1]: Finished initrd-parse-etc.service. May 8 00:38:06.397746 kernel: audit: type=1130 audit(1746664686.390:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.397774 kernel: audit: type=1131 audit(1746664686.390:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.391098 systemd[1]: Reached target initrd-fs.target. May 8 00:38:06.397110 systemd[1]: Reached target initrd.target. May 8 00:38:06.398398 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:38:06.399054 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:38:06.410921 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:38:06.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.412521 systemd[1]: Starting initrd-cleanup.service... May 8 00:38:06.415963 kernel: audit: type=1130 audit(1746664686.411:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.420093 systemd[1]: Stopped target nss-lookup.target. May 8 00:38:06.420995 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:38:06.422331 systemd[1]: Stopped target timers.target. May 8 00:38:06.423636 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:38:06.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.423728 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:38:06.429031 kernel: audit: type=1131 audit(1746664686.424:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.424938 systemd[1]: Stopped target initrd.target. May 8 00:38:06.428500 systemd[1]: Stopped target basic.target. May 8 00:38:06.429783 systemd[1]: Stopped target ignition-complete.target. May 8 00:38:06.431127 systemd[1]: Stopped target ignition-diskful.target. May 8 00:38:06.432496 systemd[1]: Stopped target initrd-root-device.target. May 8 00:38:06.434043 systemd[1]: Stopped target remote-fs.target. May 8 00:38:06.435475 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:38:06.436976 systemd[1]: Stopped target sysinit.target. May 8 00:38:06.438278 systemd[1]: Stopped target local-fs.target. May 8 00:38:06.439757 systemd[1]: Stopped target local-fs-pre.target. May 8 00:38:06.441095 systemd[1]: Stopped target swap.target. May 8 00:38:06.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.446406 kernel: audit: type=1131 audit(1746664686.443:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.442330 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:38:06.442466 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:38:06.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.443823 systemd[1]: Stopped target cryptsetup.target. May 8 00:38:06.452635 kernel: audit: type=1131 audit(1746664686.448:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.447121 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:38:06.447222 systemd[1]: Stopped dracut-initqueue.service. May 8 00:38:06.448640 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:38:06.448737 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:38:06.452161 systemd[1]: Stopped target paths.target. May 8 00:38:06.453286 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:38:06.456409 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:38:06.457343 systemd[1]: Stopped target slices.target. May 8 00:38:06.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.458551 systemd[1]: Stopped target sockets.target. May 8 00:38:06.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.460047 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:38:06.460158 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:38:06.466501 iscsid[748]: iscsid shutting down. May 8 00:38:06.461592 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:38:06.461684 systemd[1]: Stopped ignition-files.service. May 8 00:38:06.463553 systemd[1]: Stopping ignition-mount.service... May 8 00:38:06.465198 systemd[1]: Stopping iscsid.service... May 8 00:38:06.471503 ignition[898]: INFO : Ignition 2.14.0 May 8 00:38:06.471503 ignition[898]: INFO : Stage: umount May 8 00:38:06.471503 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:38:06.471503 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:38:06.471503 ignition[898]: INFO : umount: umount passed May 8 00:38:06.471503 ignition[898]: INFO : Ignition finished successfully May 8 00:38:06.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.470136 systemd[1]: Stopping sysroot-boot.service... May 8 00:38:06.472054 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:38:06.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.472204 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:38:06.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.473518 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:38:06.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.473607 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:38:06.476083 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:38:06.476173 systemd[1]: Stopped iscsid.service. May 8 00:38:06.477532 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:38:06.477604 systemd[1]: Stopped ignition-mount.service. May 8 00:38:06.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.478938 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:38:06.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.479004 systemd[1]: Closed iscsid.socket. May 8 00:38:06.479985 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:38:06.480027 systemd[1]: Stopped ignition-disks.service. May 8 00:38:06.481477 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:38:06.481517 systemd[1]: Stopped ignition-kargs.service. May 8 00:38:06.483028 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:38:06.483066 systemd[1]: Stopped ignition-setup.service. May 8 00:38:06.484600 systemd[1]: Stopping iscsiuio.service... May 8 00:38:06.489530 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:38:06.489996 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:38:06.490094 systemd[1]: Stopped iscsiuio.service. May 8 00:38:06.491087 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:38:06.491174 systemd[1]: Finished initrd-cleanup.service. May 8 00:38:06.492862 systemd[1]: Stopped target network.target. May 8 00:38:06.493711 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:38:06.493745 systemd[1]: Closed iscsiuio.socket. May 8 00:38:06.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.494924 systemd[1]: Stopping systemd-networkd.service... May 8 00:38:06.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.497171 systemd[1]: Stopping systemd-resolved.service... May 8 00:38:06.507717 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:38:06.507822 systemd[1]: Stopped systemd-resolved.service. May 8 00:38:06.508122 systemd-networkd[741]: eth0: DHCPv6 lease lost May 8 00:38:06.516000 audit: BPF prog-id=6 op=UNLOAD May 8 00:38:06.510260 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:38:06.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.510362 systemd[1]: Stopped systemd-networkd.service. May 8 00:38:06.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.511511 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:38:06.520000 audit: BPF prog-id=9 op=UNLOAD May 8 00:38:06.511538 systemd[1]: Closed systemd-networkd.socket. May 8 00:38:06.514211 systemd[1]: Stopping network-cleanup.service... May 8 00:38:06.516109 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:38:06.516166 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:38:06.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.517598 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:38:06.517643 systemd[1]: Stopped systemd-sysctl.service. May 8 00:38:06.520282 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:38:06.520330 systemd[1]: Stopped systemd-modules-load.service. May 8 00:38:06.521800 systemd[1]: Stopping systemd-udevd.service... May 8 00:38:06.523695 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:38:06.529147 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:38:06.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.529241 systemd[1]: Stopped network-cleanup.service. May 8 00:38:06.539663 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:38:06.539773 systemd[1]: Stopped systemd-udevd.service. May 8 00:38:06.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.542659 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:38:06.543527 systemd[1]: Stopped sysroot-boot.service. May 8 00:38:06.544433 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:38:06.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.544469 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:38:06.545666 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:38:06.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.545697 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:38:06.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.547111 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:38:06.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.547157 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:38:06.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.548510 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:38:06.548550 systemd[1]: Stopped dracut-cmdline.service. May 8 00:38:06.549914 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:38:06.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.549954 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:38:06.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.551222 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:38:06.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.551261 systemd[1]: Stopped initrd-setup-root.service. May 8 00:38:06.553416 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:38:06.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:06.554911 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 8 00:38:06.554981 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 8 00:38:06.557128 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:38:06.557168 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:38:06.557976 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:38:06.558016 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:38:06.560048 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 8 00:38:06.560507 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:38:06.560580 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:38:06.561804 systemd[1]: Reached target initrd-switch-root.target. May 8 00:38:06.564511 systemd[1]: Starting initrd-switch-root.service... May 8 00:38:06.570584 systemd[1]: Switching root. May 8 00:38:06.590740 systemd-journald[289]: Journal stopped May 8 00:38:08.594440 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). May 8 00:38:08.594497 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:38:08.594510 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:38:08.594520 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:38:08.594530 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:38:08.594540 kernel: SELinux: policy capability open_perms=1 May 8 00:38:08.594551 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:38:08.594565 kernel: SELinux: policy capability always_check_network=0 May 8 00:38:08.594578 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:38:08.594592 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:38:08.594601 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:38:08.594611 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:38:08.594623 systemd[1]: Successfully loaded SELinux policy in 34.687ms. May 8 00:38:08.594641 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.623ms. May 8 00:38:08.594654 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:38:08.594664 systemd[1]: Detected virtualization kvm. May 8 00:38:08.594674 systemd[1]: Detected architecture arm64. May 8 00:38:08.594685 systemd[1]: Detected first boot. May 8 00:38:08.594695 systemd[1]: Initializing machine ID from VM UUID. May 8 00:38:08.594706 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:38:08.594717 systemd[1]: Populated /etc with preset unit settings. May 8 00:38:08.594729 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:38:08.594742 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:38:08.594754 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:38:08.594765 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:38:08.594775 systemd[1]: Stopped initrd-switch-root.service. May 8 00:38:08.594786 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:38:08.594798 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:38:08.594813 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:38:08.594823 systemd[1]: Created slice system-getty.slice. May 8 00:38:08.594834 systemd[1]: Created slice system-modprobe.slice. May 8 00:38:08.594845 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:38:08.594855 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:38:08.594867 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:38:08.594877 systemd[1]: Created slice user.slice. May 8 00:38:08.594888 systemd[1]: Started systemd-ask-password-console.path. May 8 00:38:08.594899 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:38:08.594910 systemd[1]: Set up automount boot.automount. May 8 00:38:08.594920 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:38:08.594930 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:38:08.594941 systemd[1]: Stopped target initrd-fs.target. May 8 00:38:08.594951 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:38:08.594961 systemd[1]: Reached target integritysetup.target. May 8 00:38:08.594971 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:38:08.594983 systemd[1]: Reached target remote-fs.target. May 8 00:38:08.594994 systemd[1]: Reached target slices.target. May 8 00:38:08.595005 systemd[1]: Reached target swap.target. May 8 00:38:08.595015 systemd[1]: Reached target torcx.target. May 8 00:38:08.595026 systemd[1]: Reached target veritysetup.target. May 8 00:38:08.595036 systemd[1]: Listening on systemd-coredump.socket. May 8 00:38:08.595047 systemd[1]: Listening on systemd-initctl.socket. May 8 00:38:08.595057 systemd[1]: Listening on systemd-networkd.socket. May 8 00:38:08.595068 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:38:08.595078 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:38:08.595095 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:38:08.595106 systemd[1]: Mounting dev-hugepages.mount... May 8 00:38:08.595116 systemd[1]: Mounting dev-mqueue.mount... May 8 00:38:08.595127 systemd[1]: Mounting media.mount... May 8 00:38:08.595137 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:38:08.595148 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:38:08.595158 systemd[1]: Mounting tmp.mount... May 8 00:38:08.595168 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:38:08.595178 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:38:08.595190 systemd[1]: Starting kmod-static-nodes.service... May 8 00:38:08.595200 systemd[1]: Starting modprobe@configfs.service... May 8 00:38:08.595211 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:38:08.595221 systemd[1]: Starting modprobe@drm.service... May 8 00:38:08.595232 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:38:08.595242 systemd[1]: Starting modprobe@fuse.service... May 8 00:38:08.595252 systemd[1]: Starting modprobe@loop.service... May 8 00:38:08.595263 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:38:08.595273 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:38:08.595285 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:38:08.595295 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:38:08.595306 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:38:08.595318 kernel: loop: module loaded May 8 00:38:08.595328 systemd[1]: Stopped systemd-journald.service. May 8 00:38:08.595338 kernel: fuse: init (API version 7.34) May 8 00:38:08.595355 systemd[1]: Starting systemd-journald.service... May 8 00:38:08.595365 systemd[1]: Starting systemd-modules-load.service... May 8 00:38:08.595384 systemd[1]: Starting systemd-network-generator.service... May 8 00:38:08.595396 systemd[1]: Starting systemd-remount-fs.service... May 8 00:38:08.595407 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:38:08.595417 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:38:08.595428 systemd[1]: Stopped verity-setup.service. May 8 00:38:08.595438 systemd[1]: Mounted dev-hugepages.mount. May 8 00:38:08.595448 systemd[1]: Mounted dev-mqueue.mount. May 8 00:38:08.595459 systemd[1]: Mounted media.mount. May 8 00:38:08.595485 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:38:08.595496 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:38:08.595509 systemd[1]: Mounted tmp.mount. May 8 00:38:08.595519 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:38:08.595529 systemd[1]: Finished kmod-static-nodes.service. May 8 00:38:08.595542 systemd-journald[1010]: Journal started May 8 00:38:08.595581 systemd-journald[1010]: Runtime Journal (/run/log/journal/721ea5737b804e749b4782ad29a0723e) is 6.0M, max 48.7M, 42.6M free. May 8 00:38:06.660000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:38:06.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:38:06.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:38:06.740000 audit: BPF prog-id=10 op=LOAD May 8 00:38:06.740000 audit: BPF prog-id=10 op=UNLOAD May 8 00:38:06.740000 audit: BPF prog-id=11 op=LOAD May 8 00:38:06.740000 audit: BPF prog-id=11 op=UNLOAD May 8 00:38:06.787000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:38:06.787000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd8b4 a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:06.787000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:38:06.788000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:38:06.788000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001cd989 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:06.788000 audit: CWD cwd="/" May 8 00:38:06.788000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:38:06.788000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:38:06.788000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:38:08.455000 audit: BPF prog-id=12 op=LOAD May 8 00:38:08.455000 audit: BPF prog-id=3 op=UNLOAD May 8 00:38:08.455000 audit: BPF prog-id=13 op=LOAD May 8 00:38:08.456000 audit: BPF prog-id=14 op=LOAD May 8 00:38:08.456000 audit: BPF prog-id=4 op=UNLOAD May 8 00:38:08.456000 audit: BPF prog-id=5 op=UNLOAD May 8 00:38:08.456000 audit: BPF prog-id=15 op=LOAD May 8 00:38:08.456000 audit: BPF prog-id=12 op=UNLOAD May 8 00:38:08.456000 audit: BPF prog-id=16 op=LOAD May 8 00:38:08.456000 audit: BPF prog-id=17 op=LOAD May 8 00:38:08.456000 audit: BPF prog-id=13 op=UNLOAD May 8 00:38:08.456000 audit: BPF prog-id=14 op=UNLOAD May 8 00:38:08.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.467000 audit: BPF prog-id=15 op=UNLOAD May 8 00:38:08.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.565000 audit: BPF prog-id=18 op=LOAD May 8 00:38:08.565000 audit: BPF prog-id=19 op=LOAD May 8 00:38:08.565000 audit: BPF prog-id=20 op=LOAD May 8 00:38:08.565000 audit: BPF prog-id=16 op=UNLOAD May 8 00:38:08.565000 audit: BPF prog-id=17 op=UNLOAD May 8 00:38:08.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.593000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:38:08.593000 audit[1010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffffe8200 a2=4000 a3=1 items=0 ppid=1 pid=1010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:08.593000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:38:08.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.454465 systemd[1]: Queued start job for default target multi-user.target. May 8 00:38:06.785903 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:38:08.454477 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:38:06.786227 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:38:08.457403 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:38:06.786248 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:38:06.786278 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:38:06.786287 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:38:06.786316 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:38:08.597410 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:38:08.597430 systemd[1]: Finished modprobe@configfs.service. May 8 00:38:06.786327 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:38:06.786552 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:38:06.786588 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:38:06.786599 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:38:06.787395 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:38:06.787429 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:38:06.787448 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:38:06.787461 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:38:06.787479 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:38:06.787492 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:38:08.216355 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:38:08.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.216664 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:38:08.216774 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:38:08.216940 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:38:08.216991 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:38:08.217047 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-05-08T00:38:08Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:38:08.598962 systemd[1]: Started systemd-journald.service. May 8 00:38:08.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.600291 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:38:08.600469 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:38:08.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.601520 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:38:08.601679 systemd[1]: Finished modprobe@drm.service. May 8 00:38:08.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.602800 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:38:08.602954 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:38:08.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.604030 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:38:08.604168 systemd[1]: Finished modprobe@fuse.service. May 8 00:38:08.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.605184 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:38:08.605324 systemd[1]: Finished modprobe@loop.service. May 8 00:38:08.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.606420 systemd[1]: Finished systemd-modules-load.service. May 8 00:38:08.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.607575 systemd[1]: Finished systemd-network-generator.service. May 8 00:38:08.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.608763 systemd[1]: Finished systemd-remount-fs.service. May 8 00:38:08.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.610002 systemd[1]: Reached target network-pre.target. May 8 00:38:08.611894 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:38:08.613803 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:38:08.614723 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:38:08.616701 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:38:08.618486 systemd[1]: Starting systemd-journal-flush.service... May 8 00:38:08.619315 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:38:08.620356 systemd[1]: Starting systemd-random-seed.service... May 8 00:38:08.621160 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:38:08.622171 systemd[1]: Starting systemd-sysctl.service... May 8 00:38:08.624052 systemd[1]: Starting systemd-sysusers.service... May 8 00:38:08.627275 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:38:08.628508 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:38:08.635130 systemd-journald[1010]: Time spent on flushing to /var/log/journal/721ea5737b804e749b4782ad29a0723e is 13.019ms for 1000 entries. May 8 00:38:08.635130 systemd-journald[1010]: System Journal (/var/log/journal/721ea5737b804e749b4782ad29a0723e) is 8.0M, max 195.6M, 187.6M free. May 8 00:38:08.659119 systemd-journald[1010]: Received client request to flush runtime journal. May 8 00:38:08.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.635681 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:38:08.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.637805 systemd[1]: Finished systemd-random-seed.service. May 8 00:38:08.665999 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 8 00:38:08.638931 systemd[1]: Reached target first-boot-complete.target. May 8 00:38:08.640811 systemd[1]: Starting systemd-udev-settle.service... May 8 00:38:08.652697 systemd[1]: Finished systemd-sysctl.service. May 8 00:38:08.654898 systemd[1]: Finished systemd-sysusers.service. May 8 00:38:08.656894 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:38:08.664718 systemd[1]: Finished systemd-journal-flush.service. May 8 00:38:08.674201 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:38:08.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.983958 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:38:08.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:08.985000 audit: BPF prog-id=21 op=LOAD May 8 00:38:08.985000 audit: BPF prog-id=22 op=LOAD May 8 00:38:08.985000 audit: BPF prog-id=7 op=UNLOAD May 8 00:38:08.985000 audit: BPF prog-id=8 op=UNLOAD May 8 00:38:08.986207 systemd[1]: Starting systemd-udevd.service... May 8 00:38:09.003596 systemd-udevd[1037]: Using default interface naming scheme 'v252'. May 8 00:38:09.016255 systemd[1]: Started systemd-udevd.service. May 8 00:38:09.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.017000 audit: BPF prog-id=23 op=LOAD May 8 00:38:09.019383 systemd[1]: Starting systemd-networkd.service... May 8 00:38:09.024000 audit: BPF prog-id=24 op=LOAD May 8 00:38:09.024000 audit: BPF prog-id=25 op=LOAD May 8 00:38:09.024000 audit: BPF prog-id=26 op=LOAD May 8 00:38:09.025223 systemd[1]: Starting systemd-userdbd.service... May 8 00:38:09.056144 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 8 00:38:09.072955 systemd[1]: Started systemd-userdbd.service. May 8 00:38:09.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.075484 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:38:09.116166 systemd[1]: Finished systemd-udev-settle.service. May 8 00:38:09.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.118187 systemd[1]: Starting lvm2-activation-early.service... May 8 00:38:09.126389 systemd-networkd[1045]: lo: Link UP May 8 00:38:09.126620 systemd-networkd[1045]: lo: Gained carrier May 8 00:38:09.127036 systemd-networkd[1045]: Enumeration completed May 8 00:38:09.127206 systemd[1]: Started systemd-networkd.service. May 8 00:38:09.127309 systemd-networkd[1045]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:38:09.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.131733 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:38:09.132819 systemd-networkd[1045]: eth0: Link UP May 8 00:38:09.132907 systemd-networkd[1045]: eth0: Gained carrier May 8 00:38:09.157530 systemd-networkd[1045]: eth0: DHCPv4 address 10.0.0.58/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:38:09.166075 systemd[1]: Finished lvm2-activation-early.service. May 8 00:38:09.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.167059 systemd[1]: Reached target cryptsetup.target. May 8 00:38:09.168913 systemd[1]: Starting lvm2-activation.service... May 8 00:38:09.172201 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:38:09.196043 systemd[1]: Finished lvm2-activation.service. May 8 00:38:09.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.196963 systemd[1]: Reached target local-fs-pre.target. May 8 00:38:09.197820 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:38:09.197849 systemd[1]: Reached target local-fs.target. May 8 00:38:09.198606 systemd[1]: Reached target machines.target. May 8 00:38:09.200491 systemd[1]: Starting ldconfig.service... May 8 00:38:09.201495 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:38:09.201545 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:09.202547 systemd[1]: Starting systemd-boot-update.service... May 8 00:38:09.204386 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:38:09.206501 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:38:09.208306 systemd[1]: Starting systemd-sysext.service... May 8 00:38:09.211022 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) May 8 00:38:09.212074 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:38:09.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.216335 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:38:09.221268 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:38:09.226725 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:38:09.226915 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:38:09.239397 kernel: loop0: detected capacity change from 0 to 201592 May 8 00:38:09.284546 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:38:09.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.292403 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:38:09.317198 systemd-fsck[1084]: fsck.fat 4.2 (2021-01-31) May 8 00:38:09.317198 systemd-fsck[1084]: /dev/vda1: 236 files, 117182/258078 clusters May 8 00:38:09.317594 kernel: loop1: detected capacity change from 0 to 201592 May 8 00:38:09.318983 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:38:09.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.325521 (sd-sysext)[1087]: Using extensions 'kubernetes'. May 8 00:38:09.325886 (sd-sysext)[1087]: Merged extensions into '/usr'. May 8 00:38:09.345343 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:38:09.347288 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:38:09.350215 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:38:09.353255 systemd[1]: Starting modprobe@loop.service... May 8 00:38:09.354462 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:38:09.354660 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:09.355980 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:38:09.356182 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:38:09.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.358042 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:38:09.358257 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:38:09.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.360113 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:38:09.360385 systemd[1]: Finished modprobe@loop.service. May 8 00:38:09.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.361683 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:38:09.361786 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:38:09.410101 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:38:09.413561 systemd[1]: Finished ldconfig.service. May 8 00:38:09.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.583062 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:38:09.584860 systemd[1]: Mounting boot.mount... May 8 00:38:09.586671 systemd[1]: Mounting usr-share-oem.mount... May 8 00:38:09.591746 systemd[1]: Mounted usr-share-oem.mount. May 8 00:38:09.593801 systemd[1]: Finished systemd-sysext.service. May 8 00:38:09.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.595829 systemd[1]: Mounted boot.mount. May 8 00:38:09.597977 systemd[1]: Starting ensure-sysext.service... May 8 00:38:09.600102 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:38:09.605443 systemd[1]: Finished systemd-boot-update.service. May 8 00:38:09.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.606433 systemd[1]: Reloading. May 8 00:38:09.609238 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:38:09.609969 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:38:09.611259 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:38:09.654176 /usr/lib/systemd/system-generators/torcx-generator[1115]: time="2025-05-08T00:38:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:38:09.654518 /usr/lib/systemd/system-generators/torcx-generator[1115]: time="2025-05-08T00:38:09Z" level=info msg="torcx already run" May 8 00:38:09.708777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:38:09.708798 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:38:09.723786 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:38:09.764000 audit: BPF prog-id=27 op=LOAD May 8 00:38:09.764000 audit: BPF prog-id=28 op=LOAD May 8 00:38:09.764000 audit: BPF prog-id=21 op=UNLOAD May 8 00:38:09.764000 audit: BPF prog-id=22 op=UNLOAD May 8 00:38:09.765000 audit: BPF prog-id=29 op=LOAD May 8 00:38:09.765000 audit: BPF prog-id=24 op=UNLOAD May 8 00:38:09.765000 audit: BPF prog-id=30 op=LOAD May 8 00:38:09.765000 audit: BPF prog-id=31 op=LOAD May 8 00:38:09.765000 audit: BPF prog-id=25 op=UNLOAD May 8 00:38:09.765000 audit: BPF prog-id=26 op=UNLOAD May 8 00:38:09.766000 audit: BPF prog-id=32 op=LOAD May 8 00:38:09.766000 audit: BPF prog-id=23 op=UNLOAD May 8 00:38:09.767000 audit: BPF prog-id=33 op=LOAD May 8 00:38:09.767000 audit: BPF prog-id=18 op=UNLOAD May 8 00:38:09.767000 audit: BPF prog-id=34 op=LOAD May 8 00:38:09.767000 audit: BPF prog-id=35 op=LOAD May 8 00:38:09.767000 audit: BPF prog-id=19 op=UNLOAD May 8 00:38:09.767000 audit: BPF prog-id=20 op=UNLOAD May 8 00:38:09.769230 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:38:09.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.773332 systemd[1]: Starting audit-rules.service... May 8 00:38:09.775212 systemd[1]: Starting clean-ca-certificates.service... May 8 00:38:09.777142 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:38:09.778000 audit: BPF prog-id=36 op=LOAD May 8 00:38:09.779827 systemd[1]: Starting systemd-resolved.service... May 8 00:38:09.782000 audit: BPF prog-id=37 op=LOAD May 8 00:38:09.783682 systemd[1]: Starting systemd-timesyncd.service... May 8 00:38:09.785764 systemd[1]: Starting systemd-update-utmp.service... May 8 00:38:09.791000 audit[1160]: SYSTEM_BOOT pid=1160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:38:09.790183 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:38:09.791395 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:38:09.794284 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:38:09.796246 systemd[1]: Starting modprobe@loop.service... May 8 00:38:09.797113 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:38:09.797262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:09.798152 systemd[1]: Finished clean-ca-certificates.service. May 8 00:38:09.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.799533 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:38:09.799647 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:38:09.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.800794 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:38:09.800904 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:38:09.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.802237 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:38:09.802354 systemd[1]: Finished modprobe@loop.service. May 8 00:38:09.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.806491 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:38:09.807690 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:38:09.809609 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:38:09.811544 systemd[1]: Starting modprobe@loop.service... May 8 00:38:09.812289 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:38:09.812480 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:09.812592 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:38:09.813427 systemd[1]: Finished systemd-update-utmp.service. May 8 00:38:09.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.814704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:38:09.814815 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:38:09.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.816079 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:38:09.816185 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:38:09.817430 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:38:09.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.817883 systemd[1]: Finished modprobe@loop.service. May 8 00:38:09.819224 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:38:09.823227 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:38:09.824394 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:38:09.826293 systemd[1]: Starting modprobe@drm.service... May 8 00:38:09.828287 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:38:09.830352 systemd[1]: Starting modprobe@loop.service... May 8 00:38:09.831238 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:38:09.831395 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:09.832594 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:38:09.834895 systemd[1]: Starting systemd-update-done.service... May 8 00:38:09.835804 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:38:09.837069 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:38:09.837183 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:38:09.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.838735 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:38:09.838906 systemd[1]: Finished modprobe@drm.service. May 8 00:38:09.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.840105 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:38:09.840214 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:38:09.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:09.841625 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:38:09.841735 systemd[1]: Finished modprobe@loop.service. May 8 00:38:09.842000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:38:09.842000 audit[1185]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6c66640 a2=420 a3=0 items=0 ppid=1154 pid=1185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:09.842000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:38:09.842921 augenrules[1185]: No rules May 8 00:38:09.843320 systemd[1]: Finished systemd-update-done.service. May 8 00:38:09.844665 systemd[1]: Finished audit-rules.service. May 8 00:38:09.845939 systemd-resolved[1158]: Positive Trust Anchors: May 8 00:38:09.845949 systemd-resolved[1158]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:38:09.845975 systemd-resolved[1158]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:38:09.846066 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:38:09.846151 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:38:09.847833 systemd[1]: Finished ensure-sysext.service. May 8 00:38:10.253110 systemd-timesyncd[1159]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:38:10.253195 systemd[1]: Started systemd-timesyncd.service. May 8 00:38:10.253858 systemd-timesyncd[1159]: Initial clock synchronization to Thu 2025-05-08 00:38:10.253022 UTC. May 8 00:38:10.254293 systemd[1]: Reached target time-set.target. May 8 00:38:10.259975 systemd-resolved[1158]: Defaulting to hostname 'linux'. May 8 00:38:10.261355 systemd[1]: Started systemd-resolved.service. May 8 00:38:10.262216 systemd[1]: Reached target network.target. May 8 00:38:10.262982 systemd[1]: Reached target nss-lookup.target. May 8 00:38:10.263770 systemd[1]: Reached target sysinit.target. May 8 00:38:10.264583 systemd[1]: Started motdgen.path. May 8 00:38:10.265299 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:38:10.266650 systemd[1]: Started logrotate.timer. May 8 00:38:10.267433 systemd[1]: Started mdadm.timer. May 8 00:38:10.268124 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:38:10.268956 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:38:10.268984 systemd[1]: Reached target paths.target. May 8 00:38:10.269704 systemd[1]: Reached target timers.target. May 8 00:38:10.270781 systemd[1]: Listening on dbus.socket. May 8 00:38:10.272397 systemd[1]: Starting docker.socket... May 8 00:38:10.275563 systemd[1]: Listening on sshd.socket. May 8 00:38:10.276386 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:10.276825 systemd[1]: Listening on docker.socket. May 8 00:38:10.277662 systemd[1]: Reached target sockets.target. May 8 00:38:10.278401 systemd[1]: Reached target basic.target. May 8 00:38:10.279243 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:38:10.279274 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:38:10.280227 systemd[1]: Starting containerd.service... May 8 00:38:10.281949 systemd[1]: Starting dbus.service... May 8 00:38:10.283615 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:38:10.285488 systemd[1]: Starting extend-filesystems.service... May 8 00:38:10.286523 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:38:10.290040 systemd[1]: Starting motdgen.service... May 8 00:38:10.292065 systemd[1]: Starting prepare-helm.service... May 8 00:38:10.294085 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:38:10.296668 jq[1197]: false May 8 00:38:10.296017 systemd[1]: Starting sshd-keygen.service... May 8 00:38:10.301903 systemd[1]: Starting systemd-logind.service... May 8 00:38:10.302745 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:38:10.302819 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:38:10.303220 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:38:10.303899 systemd[1]: Starting update-engine.service... May 8 00:38:10.305668 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:38:10.306104 extend-filesystems[1198]: Found loop1 May 8 00:38:10.308057 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:38:10.308163 jq[1216]: true May 8 00:38:10.308232 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:38:10.308519 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:38:10.308698 systemd[1]: Finished motdgen.service. May 8 00:38:10.310034 extend-filesystems[1198]: Found vda May 8 00:38:10.311064 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:38:10.311227 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:38:10.311927 extend-filesystems[1198]: Found vda1 May 8 00:38:10.321546 tar[1218]: linux-arm64/LICENSE May 8 00:38:10.321819 tar[1218]: linux-arm64/helm May 8 00:38:10.321982 extend-filesystems[1198]: Found vda2 May 8 00:38:10.322915 extend-filesystems[1198]: Found vda3 May 8 00:38:10.323852 extend-filesystems[1198]: Found usr May 8 00:38:10.324631 jq[1219]: true May 8 00:38:10.325166 extend-filesystems[1198]: Found vda4 May 8 00:38:10.325166 extend-filesystems[1198]: Found vda6 May 8 00:38:10.325166 extend-filesystems[1198]: Found vda7 May 8 00:38:10.325166 extend-filesystems[1198]: Found vda9 May 8 00:38:10.325166 extend-filesystems[1198]: Checking size of /dev/vda9 May 8 00:38:10.331395 systemd[1]: Started dbus.service. May 8 00:38:10.328569 dbus-daemon[1196]: [system] SELinux support is enabled May 8 00:38:10.333915 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:38:10.333954 systemd[1]: Reached target system-config.target. May 8 00:38:10.334885 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:38:10.334903 systemd[1]: Reached target user-config.target. May 8 00:38:10.351812 extend-filesystems[1198]: Resized partition /dev/vda9 May 8 00:38:10.356541 extend-filesystems[1244]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:38:10.376316 bash[1245]: Updated "/home/core/.ssh/authorized_keys" May 8 00:38:10.377480 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:38:10.381622 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:38:10.385686 systemd-logind[1212]: Watching system buttons on /dev/input/event0 (Power Button) May 8 00:38:10.399347 systemd-logind[1212]: New seat seat0. May 8 00:38:10.403774 systemd[1]: Started systemd-logind.service. May 8 00:38:10.414789 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:38:10.428752 update_engine[1214]: I0508 00:38:10.425278 1214 main.cc:92] Flatcar Update Engine starting May 8 00:38:10.431475 systemd[1]: Started update-engine.service. May 8 00:38:10.431726 extend-filesystems[1244]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:38:10.431726 extend-filesystems[1244]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:38:10.431726 extend-filesystems[1244]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:38:10.436881 update_engine[1214]: I0508 00:38:10.431494 1214 update_check_scheduler.cc:74] Next update check in 7m40s May 8 00:38:10.434967 systemd[1]: Started locksmithd.service. May 8 00:38:10.436959 extend-filesystems[1198]: Resized filesystem in /dev/vda9 May 8 00:38:10.436253 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:38:10.436440 systemd[1]: Finished extend-filesystems.service. May 8 00:38:10.463394 env[1220]: time="2025-05-08T00:38:10.462655000Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:38:10.481952 env[1220]: time="2025-05-08T00:38:10.481902280Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:38:10.482155 env[1220]: time="2025-05-08T00:38:10.482079360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.484822 env[1220]: time="2025-05-08T00:38:10.484766240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:38:10.484822 env[1220]: time="2025-05-08T00:38:10.484805560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.485080 env[1220]: time="2025-05-08T00:38:10.485043400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:38:10.485080 env[1220]: time="2025-05-08T00:38:10.485068240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.485134 env[1220]: time="2025-05-08T00:38:10.485081680Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:38:10.485134 env[1220]: time="2025-05-08T00:38:10.485091720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.485172 env[1220]: time="2025-05-08T00:38:10.485163520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.485459 env[1220]: time="2025-05-08T00:38:10.485429160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:38:10.485634 env[1220]: time="2025-05-08T00:38:10.485583240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:38:10.485668 env[1220]: time="2025-05-08T00:38:10.485635080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:38:10.485719 env[1220]: time="2025-05-08T00:38:10.485701840Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:38:10.485758 env[1220]: time="2025-05-08T00:38:10.485720960Z" level=info msg="metadata content store policy set" policy=shared May 8 00:38:10.489804 env[1220]: time="2025-05-08T00:38:10.489719280Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:38:10.489804 env[1220]: time="2025-05-08T00:38:10.489756560Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:38:10.489804 env[1220]: time="2025-05-08T00:38:10.489771480Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:38:10.489804 env[1220]: time="2025-05-08T00:38:10.489800280Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:38:10.489927 env[1220]: time="2025-05-08T00:38:10.489814560Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:38:10.489927 env[1220]: time="2025-05-08T00:38:10.489827640Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:38:10.489927 env[1220]: time="2025-05-08T00:38:10.489840240Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490204 env[1220]: time="2025-05-08T00:38:10.490186360Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490239 env[1220]: time="2025-05-08T00:38:10.490208840Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490239 env[1220]: time="2025-05-08T00:38:10.490229120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490278 env[1220]: time="2025-05-08T00:38:10.490241560Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490278 env[1220]: time="2025-05-08T00:38:10.490255880Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:38:10.490388 env[1220]: time="2025-05-08T00:38:10.490369720Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:38:10.490463 env[1220]: time="2025-05-08T00:38:10.490450200Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:38:10.490737 env[1220]: time="2025-05-08T00:38:10.490719760Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:38:10.490773 env[1220]: time="2025-05-08T00:38:10.490751240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490773 env[1220]: time="2025-05-08T00:38:10.490764440Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:38:10.490877 env[1220]: time="2025-05-08T00:38:10.490866280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490907 env[1220]: time="2025-05-08T00:38:10.490880200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490907 env[1220]: time="2025-05-08T00:38:10.490892360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490907 env[1220]: time="2025-05-08T00:38:10.490904240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490973 env[1220]: time="2025-05-08T00:38:10.490915840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490973 env[1220]: time="2025-05-08T00:38:10.490927240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490973 env[1220]: time="2025-05-08T00:38:10.490937720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490973 env[1220]: time="2025-05-08T00:38:10.490949280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:38:10.490973 env[1220]: time="2025-05-08T00:38:10.490961400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:38:10.491110 env[1220]: time="2025-05-08T00:38:10.491089480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:38:10.491148 env[1220]: time="2025-05-08T00:38:10.491117240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:38:10.491148 env[1220]: time="2025-05-08T00:38:10.491131120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:38:10.491148 env[1220]: time="2025-05-08T00:38:10.491142720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:38:10.491204 env[1220]: time="2025-05-08T00:38:10.491157280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:38:10.491204 env[1220]: time="2025-05-08T00:38:10.491169880Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:38:10.491204 env[1220]: time="2025-05-08T00:38:10.491186080Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:38:10.491267 env[1220]: time="2025-05-08T00:38:10.491218160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:38:10.491449 env[1220]: time="2025-05-08T00:38:10.491399080Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:38:10.492055 env[1220]: time="2025-05-08T00:38:10.491455840Z" level=info msg="Connect containerd service" May 8 00:38:10.492055 env[1220]: time="2025-05-08T00:38:10.491484560Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:38:10.492151 env[1220]: time="2025-05-08T00:38:10.492123480Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:38:10.492397 env[1220]: time="2025-05-08T00:38:10.492360040Z" level=info msg="Start subscribing containerd event" May 8 00:38:10.492501 env[1220]: time="2025-05-08T00:38:10.492484600Z" level=info msg="Start recovering state" May 8 00:38:10.492653 env[1220]: time="2025-05-08T00:38:10.492525760Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:38:10.492695 env[1220]: time="2025-05-08T00:38:10.492689160Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:38:10.492757 env[1220]: time="2025-05-08T00:38:10.492742440Z" level=info msg="containerd successfully booted in 0.031059s" May 8 00:38:10.492757 env[1220]: time="2025-05-08T00:38:10.492635680Z" level=info msg="Start event monitor" May 8 00:38:10.492816 env[1220]: time="2025-05-08T00:38:10.492769520Z" level=info msg="Start snapshots syncer" May 8 00:38:10.492816 env[1220]: time="2025-05-08T00:38:10.492779840Z" level=info msg="Start cni network conf syncer for default" May 8 00:38:10.492816 env[1220]: time="2025-05-08T00:38:10.492787640Z" level=info msg="Start streaming server" May 8 00:38:10.492816 systemd[1]: Started containerd.service. May 8 00:38:10.557996 locksmithd[1248]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:38:10.756826 tar[1218]: linux-arm64/README.md May 8 00:38:10.761130 systemd[1]: Finished prepare-helm.service. May 8 00:38:11.278785 systemd-networkd[1045]: eth0: Gained IPv6LL May 8 00:38:11.280434 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:38:11.281783 systemd[1]: Reached target network-online.target. May 8 00:38:11.284131 systemd[1]: Starting kubelet.service... May 8 00:38:11.635936 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:38:11.654045 systemd[1]: Finished sshd-keygen.service. May 8 00:38:11.656409 systemd[1]: Starting issuegen.service... May 8 00:38:11.661071 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:38:11.661216 systemd[1]: Finished issuegen.service. May 8 00:38:11.663471 systemd[1]: Starting systemd-user-sessions.service... May 8 00:38:11.669067 systemd[1]: Finished systemd-user-sessions.service. May 8 00:38:11.671250 systemd[1]: Started getty@tty1.service. May 8 00:38:11.673242 systemd[1]: Started serial-getty@ttyAMA0.service. May 8 00:38:11.674369 systemd[1]: Reached target getty.target. May 8 00:38:11.849839 systemd[1]: Started kubelet.service. May 8 00:38:11.851084 systemd[1]: Reached target multi-user.target. May 8 00:38:11.853152 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:38:11.859818 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:38:11.859970 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:38:11.861081 systemd[1]: Startup finished in 590ms (kernel) + 5.042s (initrd) + 4.836s (userspace) = 10.469s. May 8 00:38:12.281203 kubelet[1278]: E0508 00:38:12.281150 1278 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:38:12.283044 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:38:12.283176 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:38:14.612906 systemd[1]: Created slice system-sshd.slice. May 8 00:38:14.614037 systemd[1]: Started sshd@0-10.0.0.58:22-10.0.0.1:54656.service. May 8 00:38:14.664257 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 54656 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:14.668347 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:14.677713 systemd[1]: Created slice user-500.slice. May 8 00:38:14.678804 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:38:14.680407 systemd-logind[1212]: New session 1 of user core. May 8 00:38:14.687105 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:38:14.688432 systemd[1]: Starting user@500.service... May 8 00:38:14.691197 (systemd)[1291]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:14.754480 systemd[1291]: Queued start job for default target default.target. May 8 00:38:14.755014 systemd[1291]: Reached target paths.target. May 8 00:38:14.755035 systemd[1291]: Reached target sockets.target. May 8 00:38:14.755046 systemd[1291]: Reached target timers.target. May 8 00:38:14.755057 systemd[1291]: Reached target basic.target. May 8 00:38:14.755112 systemd[1291]: Reached target default.target. May 8 00:38:14.755138 systemd[1291]: Startup finished in 58ms. May 8 00:38:14.755252 systemd[1]: Started user@500.service. May 8 00:38:14.756230 systemd[1]: Started session-1.scope. May 8 00:38:14.807492 systemd[1]: Started sshd@1-10.0.0.58:22-10.0.0.1:54662.service. May 8 00:38:14.850024 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 54662 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:14.851626 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:14.855080 systemd-logind[1212]: New session 2 of user core. May 8 00:38:14.856297 systemd[1]: Started session-2.scope. May 8 00:38:14.909691 sshd[1300]: pam_unix(sshd:session): session closed for user core May 8 00:38:14.913918 systemd[1]: Started sshd@2-10.0.0.58:22-10.0.0.1:54668.service. May 8 00:38:14.914653 systemd[1]: sshd@1-10.0.0.58:22-10.0.0.1:54662.service: Deactivated successfully. May 8 00:38:14.915308 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:38:14.915857 systemd-logind[1212]: Session 2 logged out. Waiting for processes to exit. May 8 00:38:14.916580 systemd-logind[1212]: Removed session 2. May 8 00:38:14.957456 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 54668 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:14.958743 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:14.963092 systemd[1]: Started session-3.scope. May 8 00:38:14.963507 systemd-logind[1212]: New session 3 of user core. May 8 00:38:15.013401 sshd[1305]: pam_unix(sshd:session): session closed for user core May 8 00:38:15.017102 systemd[1]: Started sshd@3-10.0.0.58:22-10.0.0.1:54684.service. May 8 00:38:15.017851 systemd[1]: sshd@2-10.0.0.58:22-10.0.0.1:54668.service: Deactivated successfully. May 8 00:38:15.018577 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:38:15.019145 systemd-logind[1212]: Session 3 logged out. Waiting for processes to exit. May 8 00:38:15.022329 systemd-logind[1212]: Removed session 3. May 8 00:38:15.060428 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 54684 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:15.062011 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:15.066056 systemd[1]: Started session-4.scope. May 8 00:38:15.066319 systemd-logind[1212]: New session 4 of user core. May 8 00:38:15.129613 sshd[1311]: pam_unix(sshd:session): session closed for user core May 8 00:38:15.132913 systemd[1]: Started sshd@4-10.0.0.58:22-10.0.0.1:54694.service. May 8 00:38:15.133398 systemd[1]: sshd@3-10.0.0.58:22-10.0.0.1:54684.service: Deactivated successfully. May 8 00:38:15.134055 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:38:15.134570 systemd-logind[1212]: Session 4 logged out. Waiting for processes to exit. May 8 00:38:15.135399 systemd-logind[1212]: Removed session 4. May 8 00:38:15.184677 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 54694 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:15.185273 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:15.189696 systemd[1]: Started session-5.scope. May 8 00:38:15.189902 systemd-logind[1212]: New session 5 of user core. May 8 00:38:15.258151 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:38:15.258677 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:38:15.272493 dbus-daemon[1196]: avc: received setenforce notice (enforcing=1) May 8 00:38:15.273207 sudo[1322]: pam_unix(sudo:session): session closed for user root May 8 00:38:15.275882 sshd[1318]: pam_unix(sshd:session): session closed for user core May 8 00:38:15.279825 systemd[1]: sshd@4-10.0.0.58:22-10.0.0.1:54694.service: Deactivated successfully. May 8 00:38:15.280402 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:38:15.280975 systemd-logind[1212]: Session 5 logged out. Waiting for processes to exit. May 8 00:38:15.282082 systemd[1]: Started sshd@5-10.0.0.58:22-10.0.0.1:54702.service. May 8 00:38:15.283419 systemd-logind[1212]: Removed session 5. May 8 00:38:15.325804 sshd[1326]: Accepted publickey for core from 10.0.0.1 port 54702 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:15.327052 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:15.330658 systemd-logind[1212]: New session 6 of user core. May 8 00:38:15.332694 systemd[1]: Started session-6.scope. May 8 00:38:15.385298 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:38:15.385517 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:38:15.388413 sudo[1330]: pam_unix(sudo:session): session closed for user root May 8 00:38:15.392492 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:38:15.392956 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:38:15.407899 systemd[1]: Stopping audit-rules.service... May 8 00:38:15.408000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:38:15.410308 kernel: kauditd_printk_skb: 174 callbacks suppressed May 8 00:38:15.410343 kernel: audit: type=1305 audit(1746664695.408:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:38:15.408000 audit[1333]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb5998a0 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.412124 auditctl[1333]: No rules May 8 00:38:15.412472 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:38:15.412708 systemd[1]: Stopped audit-rules.service. May 8 00:38:15.414069 systemd[1]: Starting audit-rules.service... May 8 00:38:15.416290 kernel: audit: type=1300 audit(1746664695.408:207): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb5998a0 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.416331 kernel: audit: type=1327 audit(1746664695.408:207): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:38:15.408000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:38:15.417525 kernel: audit: type=1131 audit(1746664695.412:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.430243 augenrules[1350]: No rules May 8 00:38:15.430853 systemd[1]: Finished audit-rules.service. May 8 00:38:15.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.431964 sudo[1329]: pam_unix(sudo:session): session closed for user root May 8 00:38:15.431000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.435446 sshd[1326]: pam_unix(sshd:session): session closed for user core May 8 00:38:15.439669 kernel: audit: type=1130 audit(1746664695.430:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.439742 kernel: audit: type=1106 audit(1746664695.431:210): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.439766 kernel: audit: type=1104 audit(1746664695.431:211): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.431000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.439703 systemd[1]: Started sshd@6-10.0.0.58:22-10.0.0.1:54712.service. May 8 00:38:15.440508 systemd-logind[1212]: Session 6 logged out. Waiting for processes to exit. May 8 00:38:15.440644 systemd[1]: sshd@5-10.0.0.58:22-10.0.0.1:54702.service: Deactivated successfully. May 8 00:38:15.441225 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:38:15.441642 kernel: audit: type=1106 audit(1746664695.436:212): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.436000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.442577 systemd-logind[1212]: Removed session 6. May 8 00:38:15.437000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.447707 kernel: audit: type=1104 audit(1746664695.437:213): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.447744 kernel: audit: type=1130 audit(1746664695.439:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.58:22-10.0.0.1:54712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.58:22-10.0.0.1:54712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.58:22-10.0.0.1:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:15.483000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.483902 sshd[1355]: Accepted publickey for core from 10.0.0.1 port 54712 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:38:15.484000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.484000 audit[1355]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd07dcba0 a2=3 a3=1 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:38:15.485570 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:38:15.489325 systemd-logind[1212]: New session 7 of user core. May 8 00:38:15.489840 systemd[1]: Started session-7.scope. May 8 00:38:15.495000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.496000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:15.543000 audit[1359]: USER_ACCT pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.543832 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:38:15.543000 audit[1359]: CRED_REFR pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.544321 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:38:15.545000 audit[1359]: USER_START pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:15.604961 systemd[1]: Starting docker.service... May 8 00:38:15.693561 env[1371]: time="2025-05-08T00:38:15.693444760Z" level=info msg="Starting up" May 8 00:38:15.696623 env[1371]: time="2025-05-08T00:38:15.695432680Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:38:15.696623 env[1371]: time="2025-05-08T00:38:15.695450360Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:38:15.696623 env[1371]: time="2025-05-08T00:38:15.695468760Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:38:15.696623 env[1371]: time="2025-05-08T00:38:15.695478400Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:38:15.697630 env[1371]: time="2025-05-08T00:38:15.697608760Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:38:15.697712 env[1371]: time="2025-05-08T00:38:15.697699240Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:38:15.697783 env[1371]: time="2025-05-08T00:38:15.697768560Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:38:15.697833 env[1371]: time="2025-05-08T00:38:15.697820760Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:38:15.882675 env[1371]: time="2025-05-08T00:38:15.882629080Z" level=info msg="Loading containers: start." May 8 00:38:15.940000 audit[1405]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.940000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc9f86da0 a2=0 a3=1 items=0 ppid=1371 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:38:15.942000 audit[1407]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.942000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff4900fb0 a2=0 a3=1 items=0 ppid=1371 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:38:15.945000 audit[1409]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.945000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffeeb7f680 a2=0 a3=1 items=0 ppid=1371 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:38:15.947000 audit[1411]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.947000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd8bbd5c0 a2=0 a3=1 items=0 ppid=1371 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:38:15.949000 audit[1413]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.949000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc23538e0 a2=0 a3=1 items=0 ppid=1371 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.949000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:38:15.978000 audit[1418]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.978000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc2b4320 a2=0 a3=1 items=0 ppid=1371 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:38:15.985000 audit[1420]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.985000 audit[1420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc7122cf0 a2=0 a3=1 items=0 ppid=1371 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.985000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:38:15.987000 audit[1422]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.987000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe2b7db50 a2=0 a3=1 items=0 ppid=1371 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:38:15.989000 audit[1424]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.989000 audit[1424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff29d92b0 a2=0 a3=1 items=0 ppid=1371 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:38:15.998000 audit[1428]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:15.998000 audit[1428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc3af8a60 a2=0 a3=1 items=0 ppid=1371 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:15.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:38:16.008000 audit[1429]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.008000 audit[1429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdba8de80 a2=0 a3=1 items=0 ppid=1371 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.008000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:38:16.018613 kernel: Initializing XFRM netlink socket May 8 00:38:16.043553 env[1371]: time="2025-05-08T00:38:16.043049440Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:38:16.058000 audit[1437]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.058000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc01f10e0 a2=0 a3=1 items=0 ppid=1371 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:38:16.077000 audit[1440]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.077000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd28a5830 a2=0 a3=1 items=0 ppid=1371 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:38:16.079000 audit[1443]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.079000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe9e4fcb0 a2=0 a3=1 items=0 ppid=1371 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:38:16.081000 audit[1445]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.081000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcd980a10 a2=0 a3=1 items=0 ppid=1371 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:38:16.083000 audit[1447]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.083000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc2aba3e0 a2=0 a3=1 items=0 ppid=1371 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:38:16.085000 audit[1449]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.085000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd0322d80 a2=0 a3=1 items=0 ppid=1371 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:38:16.088000 audit[1451]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.088000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff99b8540 a2=0 a3=1 items=0 ppid=1371 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:38:16.099000 audit[1454]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.099000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff991d890 a2=0 a3=1 items=0 ppid=1371 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:38:16.101000 audit[1456]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.101000 audit[1456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe781b620 a2=0 a3=1 items=0 ppid=1371 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:38:16.104000 audit[1458]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.104000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffdbae15c0 a2=0 a3=1 items=0 ppid=1371 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:38:16.107000 audit[1460]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.107000 audit[1460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcbb4e260 a2=0 a3=1 items=0 ppid=1371 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:38:16.108160 systemd-networkd[1045]: docker0: Link UP May 8 00:38:16.115000 audit[1464]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.115000 audit[1464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcfbed420 a2=0 a3=1 items=0 ppid=1371 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:38:16.127000 audit[1465]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:16.127000 audit[1465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe33b3a80 a2=0 a3=1 items=0 ppid=1371 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:16.127000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:38:16.128332 env[1371]: time="2025-05-08T00:38:16.127904720Z" level=info msg="Loading containers: done." May 8 00:38:16.149584 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4166633862-merged.mount: Deactivated successfully. May 8 00:38:16.157193 env[1371]: time="2025-05-08T00:38:16.157146600Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:38:16.157340 env[1371]: time="2025-05-08T00:38:16.157330000Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:38:16.157455 env[1371]: time="2025-05-08T00:38:16.157419520Z" level=info msg="Daemon has completed initialization" May 8 00:38:16.172988 systemd[1]: Started docker.service. May 8 00:38:16.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:16.181184 env[1371]: time="2025-05-08T00:38:16.181124480Z" level=info msg="API listen on /run/docker.sock" May 8 00:38:16.943763 env[1220]: time="2025-05-08T00:38:16.943706200Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 8 00:38:17.697515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2973339246.mount: Deactivated successfully. May 8 00:38:19.400609 env[1220]: time="2025-05-08T00:38:19.400547520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:19.402116 env[1220]: time="2025-05-08T00:38:19.402080240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:19.403837 env[1220]: time="2025-05-08T00:38:19.403813080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:19.406094 env[1220]: time="2025-05-08T00:38:19.406057280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:19.406966 env[1220]: time="2025-05-08T00:38:19.406933640Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b\"" May 8 00:38:19.408339 env[1220]: time="2025-05-08T00:38:19.408314040Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 8 00:38:21.388987 env[1220]: time="2025-05-08T00:38:21.388929560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:21.390165 env[1220]: time="2025-05-08T00:38:21.390141280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:21.391827 env[1220]: time="2025-05-08T00:38:21.391793200Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:21.393493 env[1220]: time="2025-05-08T00:38:21.393463480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:21.394270 env[1220]: time="2025-05-08T00:38:21.394243240Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965\"" May 8 00:38:21.394907 env[1220]: time="2025-05-08T00:38:21.394871680Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 8 00:38:22.533919 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:38:22.534100 systemd[1]: Stopped kubelet.service. May 8 00:38:22.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.535072 kernel: kauditd_printk_skb: 84 callbacks suppressed May 8 00:38:22.535136 kernel: audit: type=1130 audit(1746664702.533:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.535490 systemd[1]: Starting kubelet.service... May 8 00:38:22.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.540133 kernel: audit: type=1131 audit(1746664702.533:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.629740 systemd[1]: Started kubelet.service. May 8 00:38:22.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.634636 kernel: audit: type=1130 audit(1746664702.629:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:22.664679 kubelet[1505]: E0508 00:38:22.664640 1505 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:38:22.667224 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:38:22.667356 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:38:22.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:38:22.670625 kernel: audit: type=1131 audit(1746664702.666:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:38:23.042946 env[1220]: time="2025-05-08T00:38:23.042894480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:23.047008 env[1220]: time="2025-05-08T00:38:23.045686680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:23.048704 env[1220]: time="2025-05-08T00:38:23.048675720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:23.049568 env[1220]: time="2025-05-08T00:38:23.049538800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:23.050382 env[1220]: time="2025-05-08T00:38:23.050328640Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245\"" May 8 00:38:23.051357 env[1220]: time="2025-05-08T00:38:23.051333600Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 8 00:38:24.394241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount311890736.mount: Deactivated successfully. May 8 00:38:24.964022 env[1220]: time="2025-05-08T00:38:24.963972760Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:24.966038 env[1220]: time="2025-05-08T00:38:24.966010720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:24.967837 env[1220]: time="2025-05-08T00:38:24.967745080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:24.969202 env[1220]: time="2025-05-08T00:38:24.969152320Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:24.969697 env[1220]: time="2025-05-08T00:38:24.969529000Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 8 00:38:24.970773 env[1220]: time="2025-05-08T00:38:24.970734320Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 8 00:38:25.549153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount299736805.mount: Deactivated successfully. May 8 00:38:26.710492 env[1220]: time="2025-05-08T00:38:26.710442280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:26.711998 env[1220]: time="2025-05-08T00:38:26.711968920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:26.713887 env[1220]: time="2025-05-08T00:38:26.713859240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:26.715788 env[1220]: time="2025-05-08T00:38:26.715764520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:26.716729 env[1220]: time="2025-05-08T00:38:26.716701600Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 8 00:38:26.717367 env[1220]: time="2025-05-08T00:38:26.717340560Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 8 00:38:27.199535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount712620035.mount: Deactivated successfully. May 8 00:38:27.204302 env[1220]: time="2025-05-08T00:38:27.204238960Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:27.206318 env[1220]: time="2025-05-08T00:38:27.206283680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:27.207805 env[1220]: time="2025-05-08T00:38:27.207776640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:27.209571 env[1220]: time="2025-05-08T00:38:27.208926480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:27.209714 env[1220]: time="2025-05-08T00:38:27.209516640Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 8 00:38:27.210171 env[1220]: time="2025-05-08T00:38:27.210147400Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 8 00:38:27.770583 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount362002952.mount: Deactivated successfully. May 8 00:38:31.719064 env[1220]: time="2025-05-08T00:38:31.718999560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:31.721352 env[1220]: time="2025-05-08T00:38:31.721318920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:31.723653 env[1220]: time="2025-05-08T00:38:31.723624840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:31.725512 env[1220]: time="2025-05-08T00:38:31.725477640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:31.726578 env[1220]: time="2025-05-08T00:38:31.726454600Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 8 00:38:32.918123 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:38:32.918303 systemd[1]: Stopped kubelet.service. May 8 00:38:32.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:32.919709 systemd[1]: Starting kubelet.service... May 8 00:38:32.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:32.924554 kernel: audit: type=1130 audit(1746664712.917:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:32.924624 kernel: audit: type=1131 audit(1746664712.917:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:33.014467 systemd[1]: Started kubelet.service. May 8 00:38:33.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:33.017634 kernel: audit: type=1130 audit(1746664713.014:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:33.049869 kubelet[1536]: E0508 00:38:33.049823 1536 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:38:33.052104 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:38:33.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:38:33.052220 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:38:33.055613 kernel: audit: type=1131 audit(1746664713.051:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:38:36.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.567486 systemd[1]: Stopped kubelet.service. May 8 00:38:36.569397 systemd[1]: Starting kubelet.service... May 8 00:38:36.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.572700 kernel: audit: type=1130 audit(1746664716.567:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.572769 kernel: audit: type=1131 audit(1746664716.567:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.595242 systemd[1]: Reloading. May 8 00:38:36.644434 /usr/lib/systemd/system-generators/torcx-generator[1572]: time="2025-05-08T00:38:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:38:36.644469 /usr/lib/systemd/system-generators/torcx-generator[1572]: time="2025-05-08T00:38:36Z" level=info msg="torcx already run" May 8 00:38:36.814075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:38:36.814290 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:38:36.829846 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:38:36.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882903 kernel: audit: type=1400 audit(1746664716.877:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882969 kernel: audit: type=1400 audit(1746664716.877:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882990 kernel: audit: type=1400 audit(1746664716.877:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.887626 kernel: audit: type=1400 audit(1746664716.877:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.880000 audit: BPF prog-id=43 op=LOAD May 8 00:38:36.880000 audit: BPF prog-id=41 op=UNLOAD May 8 00:38:36.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit: BPF prog-id=44 op=LOAD May 8 00:38:36.882000 audit: BPF prog-id=38 op=UNLOAD May 8 00:38:36.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit: BPF prog-id=45 op=LOAD May 8 00:38:36.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit: BPF prog-id=46 op=LOAD May 8 00:38:36.888000 audit: BPF prog-id=39 op=UNLOAD May 8 00:38:36.888000 audit: BPF prog-id=40 op=UNLOAD May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit: BPF prog-id=47 op=LOAD May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit: BPF prog-id=48 op=LOAD May 8 00:38:36.889000 audit: BPF prog-id=27 op=UNLOAD May 8 00:38:36.889000 audit: BPF prog-id=28 op=UNLOAD May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.889000 audit: BPF prog-id=49 op=LOAD May 8 00:38:36.889000 audit: BPF prog-id=36 op=UNLOAD May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit: BPF prog-id=50 op=LOAD May 8 00:38:36.890000 audit: BPF prog-id=29 op=UNLOAD May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit: BPF prog-id=51 op=LOAD May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.890000 audit: BPF prog-id=52 op=LOAD May 8 00:38:36.890000 audit: BPF prog-id=30 op=UNLOAD May 8 00:38:36.890000 audit: BPF prog-id=31 op=UNLOAD May 8 00:38:36.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.891000 audit: BPF prog-id=53 op=LOAD May 8 00:38:36.891000 audit: BPF prog-id=37 op=UNLOAD May 8 00:38:36.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.893000 audit: BPF prog-id=54 op=LOAD May 8 00:38:36.893000 audit: BPF prog-id=32 op=UNLOAD May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit: BPF prog-id=55 op=LOAD May 8 00:38:36.894000 audit: BPF prog-id=33 op=UNLOAD May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit: BPF prog-id=56 op=LOAD May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:36.894000 audit: BPF prog-id=57 op=LOAD May 8 00:38:36.894000 audit: BPF prog-id=34 op=UNLOAD May 8 00:38:36.894000 audit: BPF prog-id=35 op=UNLOAD May 8 00:38:36.913193 systemd[1]: Started kubelet.service. May 8 00:38:36.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.915830 systemd[1]: Stopping kubelet.service... May 8 00:38:36.916411 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:38:36.916737 systemd[1]: Stopped kubelet.service. May 8 00:38:36.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:36.918948 systemd[1]: Starting kubelet.service... May 8 00:38:37.011334 systemd[1]: Started kubelet.service. May 8 00:38:37.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:37.050840 kubelet[1615]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:38:37.050840 kubelet[1615]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:38:37.050840 kubelet[1615]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:38:37.051177 kubelet[1615]: I0508 00:38:37.050961 1615 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:38:37.798170 kubelet[1615]: I0508 00:38:37.798125 1615 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:38:37.798170 kubelet[1615]: I0508 00:38:37.798160 1615 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:38:37.798474 kubelet[1615]: I0508 00:38:37.798443 1615 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:38:37.827531 kubelet[1615]: E0508 00:38:37.827495 1615 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.58:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:37.828395 kubelet[1615]: I0508 00:38:37.828367 1615 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:38:37.837277 kubelet[1615]: E0508 00:38:37.837240 1615 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:38:37.837277 kubelet[1615]: I0508 00:38:37.837277 1615 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:38:37.839913 kubelet[1615]: I0508 00:38:37.839887 1615 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:38:37.840628 kubelet[1615]: I0508 00:38:37.840577 1615 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:38:37.840797 kubelet[1615]: I0508 00:38:37.840629 1615 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:38:37.840885 kubelet[1615]: I0508 00:38:37.840862 1615 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:38:37.840885 kubelet[1615]: I0508 00:38:37.840871 1615 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:38:37.841074 kubelet[1615]: I0508 00:38:37.841051 1615 state_mem.go:36] "Initialized new in-memory state store" May 8 00:38:37.843707 kubelet[1615]: I0508 00:38:37.843689 1615 kubelet.go:446] "Attempting to sync node with API server" May 8 00:38:37.843754 kubelet[1615]: I0508 00:38:37.843715 1615 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:38:37.843754 kubelet[1615]: I0508 00:38:37.843731 1615 kubelet.go:352] "Adding apiserver pod source" May 8 00:38:37.843754 kubelet[1615]: I0508 00:38:37.843740 1615 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:38:37.862381 kubelet[1615]: I0508 00:38:37.862356 1615 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:38:37.863026 kubelet[1615]: I0508 00:38:37.863006 1615 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:38:37.863136 kubelet[1615]: W0508 00:38:37.863123 1615 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:38:37.863347 kubelet[1615]: W0508 00:38:37.863292 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:37.863413 kubelet[1615]: E0508 00:38:37.863392 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:37.863928 kubelet[1615]: I0508 00:38:37.863903 1615 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:38:37.863965 kubelet[1615]: I0508 00:38:37.863938 1615 server.go:1287] "Started kubelet" May 8 00:38:37.878238 kubelet[1615]: W0508 00:38:37.878196 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:37.878356 kubelet[1615]: E0508 00:38:37.878336 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:37.878465 kubelet[1615]: I0508 00:38:37.878426 1615 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:38:37.879326 kubelet[1615]: I0508 00:38:37.879305 1615 server.go:490] "Adding debug handlers to kubelet server" May 8 00:38:37.884000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:37.884000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:37.884000 audit[1615]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c62d50 a1=4000a64b40 a2=4000c62d20 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.884000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:37.885369 kubelet[1615]: I0508 00:38:37.885345 1615 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:38:37.884000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:37.884000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:37.884000 audit[1615]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c6e340 a1=4000a64b58 a2=4000c62de0 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.884000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:37.885644 kubelet[1615]: I0508 00:38:37.885628 1615 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:38:37.885780 kubelet[1615]: I0508 00:38:37.885766 1615 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:38:37.888000 audit[1628]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.888000 audit[1628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6af3f80 a2=0 a3=1 items=0 ppid=1615 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:38:37.889000 audit[1629]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.889000 audit[1629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1eadd10 a2=0 a3=1 items=0 ppid=1615 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:38:37.891982 kubelet[1615]: I0508 00:38:37.891959 1615 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:38:37.894152 kubelet[1615]: I0508 00:38:37.894136 1615 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:38:37.894527 kubelet[1615]: E0508 00:38:37.894507 1615 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:38:37.908000 audit[1631]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.908000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff4f41570 a2=0 a3=1 items=0 ppid=1615 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:38:37.910035 kubelet[1615]: I0508 00:38:37.909984 1615 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:38:37.910294 kubelet[1615]: I0508 00:38:37.910278 1615 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:38:37.910382 kubelet[1615]: I0508 00:38:37.910065 1615 factory.go:221] Registration of the systemd container factory successfully May 8 00:38:37.910490 kubelet[1615]: E0508 00:38:37.910446 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="200ms" May 8 00:38:37.910655 kubelet[1615]: I0508 00:38:37.910635 1615 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:38:37.910812 kubelet[1615]: E0508 00:38:37.910555 1615 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.58:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.58:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d664e81fcaf68 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:38:37.86392356 +0000 UTC m=+0.846858601,LastTimestamp:2025-05-08 00:38:37.86392356 +0000 UTC m=+0.846858601,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:38:37.910910 kubelet[1615]: I0508 00:38:37.910892 1615 reconciler.go:26] "Reconciler: start to sync state" May 8 00:38:37.911256 kubelet[1615]: E0508 00:38:37.911231 1615 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:38:37.911377 kubelet[1615]: I0508 00:38:37.911344 1615 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:38:37.911918 kubelet[1615]: W0508 00:38:37.911889 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:37.912023 kubelet[1615]: E0508 00:38:37.912006 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:37.912181 kubelet[1615]: I0508 00:38:37.912163 1615 factory.go:221] Registration of the containerd container factory successfully May 8 00:38:37.912000 audit[1633]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.912000 audit[1633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd6ca1900 a2=0 a3=1 items=0 ppid=1615 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:38:37.917000 audit[1638]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.917000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd22ccd70 a2=0 a3=1 items=0 ppid=1615 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:38:37.919516 kubelet[1615]: I0508 00:38:37.919469 1615 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:38:37.919000 audit[1640]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.920787 kubelet[1615]: I0508 00:38:37.920757 1615 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:38:37.920787 kubelet[1615]: I0508 00:38:37.920785 1615 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:38:37.920877 kernel: kauditd_printk_skb: 194 callbacks suppressed May 8 00:38:37.920910 kernel: audit: type=1325 audit(1746664717.919:441): table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.920932 kubelet[1615]: I0508 00:38:37.920803 1615 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:38:37.920932 kubelet[1615]: I0508 00:38:37.920811 1615 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:38:37.920932 kubelet[1615]: E0508 00:38:37.920864 1615 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:38:37.921298 kubelet[1615]: W0508 00:38:37.921249 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:37.921354 kubelet[1615]: E0508 00:38:37.921295 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:37.922621 kernel: audit: type=1300 audit(1746664717.919:441): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffa1a370 a2=0 a3=1 items=0 ppid=1615 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.919000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffa1a370 a2=0 a3=1 items=0 ppid=1615 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:38:37.927799 kernel: audit: type=1327 audit(1746664717.919:441): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:38:37.927854 kubelet[1615]: I0508 00:38:37.927774 1615 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:38:37.927854 kubelet[1615]: I0508 00:38:37.927788 1615 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:38:37.927854 kubelet[1615]: I0508 00:38:37.927805 1615 state_mem.go:36] "Initialized new in-memory state store" May 8 00:38:37.919000 audit[1641]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.929717 kernel: audit: type=1325 audit(1746664717.919:442): table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.929796 kernel: audit: type=1300 audit(1746664717.919:442): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdd3004a0 a2=0 a3=1 items=0 ppid=1615 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.919000 audit[1641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdd3004a0 a2=0 a3=1 items=0 ppid=1615 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:38:37.934852 kernel: audit: type=1327 audit(1746664717.919:442): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:38:37.934893 kernel: audit: type=1325 audit(1746664717.920:443): table=nat:33 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.920000 audit[1642]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.920000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3294ec0 a2=0 a3=1 items=0 ppid=1615 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.939911 kernel: audit: type=1300 audit(1746664717.920:443): arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3294ec0 a2=0 a3=1 items=0 ppid=1615 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.939944 kernel: audit: type=1327 audit(1746664717.920:443): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:38:37.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:38:37.921000 audit[1643]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.943280 kernel: audit: type=1325 audit(1746664717.921:444): table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.921000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1a13600 a2=0 a3=1 items=0 ppid=1615 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:38:37.921000 audit[1644]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:37.921000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd96d2cc0 a2=0 a3=1 items=0 ppid=1615 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:38:37.922000 audit[1645]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.922000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff5d69a40 a2=0 a3=1 items=0 ppid=1615 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:38:37.923000 audit[1646]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:37.923000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce828a50 a2=0 a3=1 items=0 ppid=1615 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:37.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:38:37.995704 kubelet[1615]: E0508 00:38:37.995635 1615 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:38:38.004528 kubelet[1615]: I0508 00:38:38.004497 1615 policy_none.go:49] "None policy: Start" May 8 00:38:38.004528 kubelet[1615]: I0508 00:38:38.004527 1615 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:38:38.004616 kubelet[1615]: I0508 00:38:38.004543 1615 state_mem.go:35] "Initializing new in-memory state store" May 8 00:38:38.010987 systemd[1]: Created slice kubepods.slice. May 8 00:38:38.017233 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:38:38.019838 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:38:38.021721 kubelet[1615]: E0508 00:38:38.021692 1615 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:38:38.032049 kubelet[1615]: I0508 00:38:38.032018 1615 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:38:38.032125 kubelet[1615]: I0508 00:38:38.032109 1615 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:38:38.032258 kubelet[1615]: I0508 00:38:38.032243 1615 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:38:38.032298 kubelet[1615]: I0508 00:38:38.032263 1615 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:38:38.032506 kubelet[1615]: I0508 00:38:38.032481 1615 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:38:38.031000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:38.031000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:38.031000 audit[1615]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c63a10 a1=4000acd380 a2=4000c639e0 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:38.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:38.033970 kubelet[1615]: E0508 00:38:38.033945 1615 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:38:38.034031 kubelet[1615]: E0508 00:38:38.033988 1615 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:38:38.112672 kubelet[1615]: E0508 00:38:38.111212 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="400ms" May 8 00:38:38.133856 kubelet[1615]: I0508 00:38:38.133829 1615 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:38.134264 kubelet[1615]: E0508 00:38:38.134200 1615 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 8 00:38:38.230021 systemd[1]: Created slice kubepods-burstable-pod37c6f054f94ef731052dba816ca970e3.slice. May 8 00:38:38.244361 kubelet[1615]: E0508 00:38:38.244330 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:38.247086 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 8 00:38:38.254830 kubelet[1615]: E0508 00:38:38.254780 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:38.256065 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 8 00:38:38.259949 kubelet[1615]: E0508 00:38:38.259903 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:38.335508 kubelet[1615]: I0508 00:38:38.335469 1615 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:38.335861 kubelet[1615]: E0508 00:38:38.335820 1615 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 8 00:38:38.412889 kubelet[1615]: I0508 00:38:38.412743 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:38.412889 kubelet[1615]: I0508 00:38:38.412795 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:38.412889 kubelet[1615]: I0508 00:38:38.412818 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:38:38.412889 kubelet[1615]: I0508 00:38:38.412836 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:38.412889 kubelet[1615]: I0508 00:38:38.412890 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:38.413063 kubelet[1615]: I0508 00:38:38.412906 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:38.413063 kubelet[1615]: I0508 00:38:38.412961 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:38.413063 kubelet[1615]: I0508 00:38:38.412977 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:38.413063 kubelet[1615]: I0508 00:38:38.412991 1615 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:38.512482 kubelet[1615]: E0508 00:38:38.512396 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="800ms" May 8 00:38:38.545772 kubelet[1615]: E0508 00:38:38.545740 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:38.546467 env[1220]: time="2025-05-08T00:38:38.546398080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:37c6f054f94ef731052dba816ca970e3,Namespace:kube-system,Attempt:0,}" May 8 00:38:38.555612 kubelet[1615]: E0508 00:38:38.555569 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:38.557363 env[1220]: time="2025-05-08T00:38:38.557317000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 8 00:38:38.560533 kubelet[1615]: E0508 00:38:38.560507 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:38.560874 env[1220]: time="2025-05-08T00:38:38.560836760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 8 00:38:38.737372 kubelet[1615]: I0508 00:38:38.737282 1615 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:38.738081 kubelet[1615]: E0508 00:38:38.738053 1615 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 8 00:38:39.043690 kubelet[1615]: W0508 00:38:39.043556 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:39.043690 kubelet[1615]: E0508 00:38:39.043620 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:39.095031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4120724921.mount: Deactivated successfully. May 8 00:38:39.098662 env[1220]: time="2025-05-08T00:38:39.098616720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.099998 env[1220]: time="2025-05-08T00:38:39.099960600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.102056 env[1220]: time="2025-05-08T00:38:39.102018160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.102789 env[1220]: time="2025-05-08T00:38:39.102762560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.104142 env[1220]: time="2025-05-08T00:38:39.104113400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.107236 env[1220]: time="2025-05-08T00:38:39.107208360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.108247 env[1220]: time="2025-05-08T00:38:39.108217480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.108326 kubelet[1615]: W0508 00:38:39.108271 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:39.108369 kubelet[1615]: E0508 00:38:39.108336 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:39.113971 env[1220]: time="2025-05-08T00:38:39.113934680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.115906 env[1220]: time="2025-05-08T00:38:39.115862280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.116949 env[1220]: time="2025-05-08T00:38:39.116922840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.118388 env[1220]: time="2025-05-08T00:38:39.118169600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.119923 env[1220]: time="2025-05-08T00:38:39.119895320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:39.157670 env[1220]: time="2025-05-08T00:38:39.157394280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:39.157670 env[1220]: time="2025-05-08T00:38:39.157436000Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:39.157670 env[1220]: time="2025-05-08T00:38:39.157446960Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:39.157670 env[1220]: time="2025-05-08T00:38:39.157580000Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8011d13e1d0ff81df2f87518ef354bcc2c8b5634d4a2b7041507756efa41e200 pid=1674 runtime=io.containerd.runc.v2 May 8 00:38:39.157912 env[1220]: time="2025-05-08T00:38:39.157174440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:39.157912 env[1220]: time="2025-05-08T00:38:39.157216800Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:39.157912 env[1220]: time="2025-05-08T00:38:39.157227400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:39.157912 env[1220]: time="2025-05-08T00:38:39.157501160Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e17825391b5f3b43d72c21b2b01f0bfd939022942cddfd97f3249df763380c6 pid=1672 runtime=io.containerd.runc.v2 May 8 00:38:39.158649 env[1220]: time="2025-05-08T00:38:39.158573000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:39.158649 env[1220]: time="2025-05-08T00:38:39.158623160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:39.158649 env[1220]: time="2025-05-08T00:38:39.158632920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:39.158932 env[1220]: time="2025-05-08T00:38:39.158878200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48216e8f1b2044fe96701fad3e3bd557d1222ecb0c14a3b18ded7d4128e72eb5 pid=1673 runtime=io.containerd.runc.v2 May 8 00:38:39.170675 systemd[1]: Started cri-containerd-8011d13e1d0ff81df2f87518ef354bcc2c8b5634d4a2b7041507756efa41e200.scope. May 8 00:38:39.183403 systemd[1]: Started cri-containerd-48216e8f1b2044fe96701fad3e3bd557d1222ecb0c14a3b18ded7d4128e72eb5.scope. May 8 00:38:39.186062 systemd[1]: Started cri-containerd-9e17825391b5f3b43d72c21b2b01f0bfd939022942cddfd97f3249df763380c6.scope. May 8 00:38:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.213000 audit: BPF prog-id=58 op=LOAD May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1673 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323136653866316232303434666539363730316661643365336264 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1673 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323136653866316232303434666539363730316661643365336264 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit: BPF prog-id=59 op=LOAD May 8 00:38:39.214000 audit[1706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1673 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323136653866316232303434666539363730316661643365336264 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit: BPF prog-id=60 op=LOAD May 8 00:38:39.214000 audit[1706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1673 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323136653866316232303434666539363730316661643365336264 May 8 00:38:39.214000 audit: BPF prog-id=60 op=UNLOAD May 8 00:38:39.214000 audit: BPF prog-id=59 op=UNLOAD May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.214000 audit: BPF prog-id=61 op=LOAD May 8 00:38:39.214000 audit[1706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1673 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323136653866316232303434666539363730316661643365336264 May 8 00:38:39.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.215000 audit: BPF prog-id=62 op=LOAD May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313164313365316430666638316466326638373531386566333534 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313164313365316430666638316466326638373531386566333534 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit: BPF prog-id=63 op=LOAD May 8 00:38:39.216000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313164313365316430666638316466326638373531386566333534 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit: BPF prog-id=64 op=LOAD May 8 00:38:39.216000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313164313365316430666638316466326638373531386566333534 May 8 00:38:39.216000 audit: BPF prog-id=64 op=UNLOAD May 8 00:38:39.216000 audit: BPF prog-id=63 op=UNLOAD May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.216000 audit: BPF prog-id=65 op=LOAD May 8 00:38:39.216000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313164313365316430666638316466326638373531386566333534 May 8 00:38:39.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.219000 audit: BPF prog-id=66 op=LOAD May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313738323533393162356633623433643732633231623262303166 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313738323533393162356633623433643732633231623262303166 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.220000 audit: BPF prog-id=67 op=LOAD May 8 00:38:39.220000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313738323533393162356633623433643732633231623262303166 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.221000 audit: BPF prog-id=68 op=LOAD May 8 00:38:39.221000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313738323533393162356633623433643732633231623262303166 May 8 00:38:39.222000 audit: BPF prog-id=68 op=UNLOAD May 8 00:38:39.222000 audit: BPF prog-id=67 op=UNLOAD May 8 00:38:39.222000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.222000 audit: BPF prog-id=69 op=LOAD May 8 00:38:39.222000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313738323533393162356633623433643732633231623262303166 May 8 00:38:39.238616 env[1220]: time="2025-05-08T00:38:39.238346760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"48216e8f1b2044fe96701fad3e3bd557d1222ecb0c14a3b18ded7d4128e72eb5\"" May 8 00:38:39.239585 kubelet[1615]: E0508 00:38:39.239555 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:39.240944 env[1220]: time="2025-05-08T00:38:39.240902520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"8011d13e1d0ff81df2f87518ef354bcc2c8b5634d4a2b7041507756efa41e200\"" May 8 00:38:39.241581 kubelet[1615]: E0508 00:38:39.241465 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:39.244699 env[1220]: time="2025-05-08T00:38:39.244659120Z" level=info msg="CreateContainer within sandbox \"48216e8f1b2044fe96701fad3e3bd557d1222ecb0c14a3b18ded7d4128e72eb5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:38:39.246013 env[1220]: time="2025-05-08T00:38:39.245958840Z" level=info msg="CreateContainer within sandbox \"8011d13e1d0ff81df2f87518ef354bcc2c8b5634d4a2b7041507756efa41e200\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:38:39.250251 kubelet[1615]: W0508 00:38:39.250160 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:39.250251 kubelet[1615]: E0508 00:38:39.250219 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:39.250793 env[1220]: time="2025-05-08T00:38:39.250748320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:37c6f054f94ef731052dba816ca970e3,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e17825391b5f3b43d72c21b2b01f0bfd939022942cddfd97f3249df763380c6\"" May 8 00:38:39.251283 kubelet[1615]: E0508 00:38:39.251260 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:39.252912 env[1220]: time="2025-05-08T00:38:39.252880200Z" level=info msg="CreateContainer within sandbox \"9e17825391b5f3b43d72c21b2b01f0bfd939022942cddfd97f3249df763380c6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:38:39.259295 env[1220]: time="2025-05-08T00:38:39.259256120Z" level=info msg="CreateContainer within sandbox \"48216e8f1b2044fe96701fad3e3bd557d1222ecb0c14a3b18ded7d4128e72eb5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"15bd2a3decd1a11b59c92c57a1fe4100450f6ade343032af91bef9ce9f558a5e\"" May 8 00:38:39.259959 env[1220]: time="2025-05-08T00:38:39.259914960Z" level=info msg="StartContainer for \"15bd2a3decd1a11b59c92c57a1fe4100450f6ade343032af91bef9ce9f558a5e\"" May 8 00:38:39.261306 env[1220]: time="2025-05-08T00:38:39.261275880Z" level=info msg="CreateContainer within sandbox \"8011d13e1d0ff81df2f87518ef354bcc2c8b5634d4a2b7041507756efa41e200\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"12bfdbc2dd4faa52f2f444bbe9d9d1d29961f8815cf185b7c0799516b36f3e3b\"" May 8 00:38:39.261863 env[1220]: time="2025-05-08T00:38:39.261788640Z" level=info msg="StartContainer for \"12bfdbc2dd4faa52f2f444bbe9d9d1d29961f8815cf185b7c0799516b36f3e3b\"" May 8 00:38:39.266357 env[1220]: time="2025-05-08T00:38:39.266314480Z" level=info msg="CreateContainer within sandbox \"9e17825391b5f3b43d72c21b2b01f0bfd939022942cddfd97f3249df763380c6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"4d8663bf9bf8484e0d324ea0529542db270eb0df251a11af7ce69aef85d2ea5c\"" May 8 00:38:39.266696 env[1220]: time="2025-05-08T00:38:39.266669720Z" level=info msg="StartContainer for \"4d8663bf9bf8484e0d324ea0529542db270eb0df251a11af7ce69aef85d2ea5c\"" May 8 00:38:39.278380 systemd[1]: Started cri-containerd-15bd2a3decd1a11b59c92c57a1fe4100450f6ade343032af91bef9ce9f558a5e.scope. May 8 00:38:39.282653 systemd[1]: Started cri-containerd-12bfdbc2dd4faa52f2f444bbe9d9d1d29961f8815cf185b7c0799516b36f3e3b.scope. May 8 00:38:39.287530 systemd[1]: Started cri-containerd-4d8663bf9bf8484e0d324ea0529542db270eb0df251a11af7ce69aef85d2ea5c.scope. May 8 00:38:39.315605 kubelet[1615]: E0508 00:38:39.314940 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="1.6s" May 8 00:38:39.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit: BPF prog-id=70 op=LOAD May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1674 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626664626332646434666161353266326634343462626539643964 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1674 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626664626332646434666161353266326634343462626539643964 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.328000 audit: BPF prog-id=71 op=LOAD May 8 00:38:39.328000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1674 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626664626332646434666161353266326634343462626539643964 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit: BPF prog-id=72 op=LOAD May 8 00:38:39.329000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1674 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626664626332646434666161353266326634343462626539643964 May 8 00:38:39.329000 audit: BPF prog-id=72 op=UNLOAD May 8 00:38:39.329000 audit: BPF prog-id=71 op=UNLOAD May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.329000 audit: BPF prog-id=73 op=LOAD May 8 00:38:39.329000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1674 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626664626332646434666161353266326634343462626539643964 May 8 00:38:39.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.331000 audit: BPF prog-id=74 op=LOAD May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1672 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383636336266396266383438346530643332346561303532393534 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1672 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383636336266396266383438346530643332346561303532393534 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit: BPF prog-id=75 op=LOAD May 8 00:38:39.332000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1672 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383636336266396266383438346530643332346561303532393534 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit: BPF prog-id=76 op=LOAD May 8 00:38:39.332000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1672 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383636336266396266383438346530643332346561303532393534 May 8 00:38:39.332000 audit: BPF prog-id=76 op=UNLOAD May 8 00:38:39.332000 audit: BPF prog-id=75 op=UNLOAD May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.332000 audit: BPF prog-id=77 op=LOAD May 8 00:38:39.332000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1672 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383636336266396266383438346530643332346561303532393534 May 8 00:38:39.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit: BPF prog-id=78 op=LOAD May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135626432613364656364316131316235396339326335376131666534 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135626432613364656364316131316235396339326335376131666534 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.339000 audit: BPF prog-id=79 op=LOAD May 8 00:38:39.339000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135626432613364656364316131316235396339326335376131666534 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit: BPF prog-id=80 op=LOAD May 8 00:38:39.340000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135626432613364656364316131316235396339326335376131666534 May 8 00:38:39.340000 audit: BPF prog-id=80 op=UNLOAD May 8 00:38:39.340000 audit: BPF prog-id=79 op=UNLOAD May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:39.340000 audit: BPF prog-id=81 op=LOAD May 8 00:38:39.340000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:39.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135626432613364656364316131316235396339326335376131666534 May 8 00:38:39.357617 env[1220]: time="2025-05-08T00:38:39.352964800Z" level=info msg="StartContainer for \"12bfdbc2dd4faa52f2f444bbe9d9d1d29961f8815cf185b7c0799516b36f3e3b\" returns successfully" May 8 00:38:39.357617 env[1220]: time="2025-05-08T00:38:39.353285600Z" level=info msg="StartContainer for \"4d8663bf9bf8484e0d324ea0529542db270eb0df251a11af7ce69aef85d2ea5c\" returns successfully" May 8 00:38:39.384532 env[1220]: time="2025-05-08T00:38:39.383747440Z" level=info msg="StartContainer for \"15bd2a3decd1a11b59c92c57a1fe4100450f6ade343032af91bef9ce9f558a5e\" returns successfully" May 8 00:38:39.422957 kubelet[1615]: W0508 00:38:39.419988 1615 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 8 00:38:39.422957 kubelet[1615]: E0508 00:38:39.420060 1615 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.58:6443: connect: connection refused" logger="UnhandledError" May 8 00:38:39.543952 kubelet[1615]: I0508 00:38:39.543912 1615 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:39.544272 kubelet[1615]: E0508 00:38:39.544241 1615 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 8 00:38:39.927769 kubelet[1615]: E0508 00:38:39.927738 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:39.927890 kubelet[1615]: E0508 00:38:39.927864 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:39.929499 kubelet[1615]: E0508 00:38:39.929477 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:39.929601 kubelet[1615]: E0508 00:38:39.929579 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:39.931486 kubelet[1615]: E0508 00:38:39.931467 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:39.931581 kubelet[1615]: E0508 00:38:39.931564 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:40.933223 kubelet[1615]: E0508 00:38:40.933192 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:40.933678 kubelet[1615]: E0508 00:38:40.933659 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:40.934199 kubelet[1615]: E0508 00:38:40.933988 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:40.934399 kubelet[1615]: E0508 00:38:40.934383 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:40.934615 kubelet[1615]: E0508 00:38:40.934586 1615 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:38:40.934773 kubelet[1615]: E0508 00:38:40.934761 1615 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:41.080000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.080000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=400636aa20 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.080000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.080000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4006b6f2c0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.087000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.087000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004b68500 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.087000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.089000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.089000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=400a07c180 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.089000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.089000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=400636b3b0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.092000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.092000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=40038ef7d0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:38:41.092000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:38:41.145662 kubelet[1615]: I0508 00:38:41.145635 1615 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:41.223028 kubelet[1615]: E0508 00:38:41.222927 1615 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 8 00:38:41.287314 kubelet[1615]: I0508 00:38:41.287274 1615 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:38:41.287314 kubelet[1615]: E0508 00:38:41.287311 1615 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 8 00:38:41.308230 kubelet[1615]: I0508 00:38:41.308200 1615 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:38:41.314225 kubelet[1615]: E0508 00:38:41.314200 1615 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 8 00:38:41.314386 kubelet[1615]: I0508 00:38:41.314370 1615 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:38:41.316084 kubelet[1615]: E0508 00:38:41.316058 1615 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 8 00:38:41.316178 kubelet[1615]: I0508 00:38:41.316166 1615 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:38:41.318967 kubelet[1615]: E0508 00:38:41.318891 1615 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 8 00:38:41.825000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.825000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40000768a0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:41.825000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:41.825000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:41.825000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000180800 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:41.825000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:41.866470 kubelet[1615]: I0508 00:38:41.866438 1615 apiserver.go:52] "Watching apiserver" May 8 00:38:41.911658 kubelet[1615]: I0508 00:38:41.911622 1615 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:38:43.485618 systemd[1]: Reloading. May 8 00:38:43.531470 /usr/lib/systemd/system-generators/torcx-generator[1913]: time="2025-05-08T00:38:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:38:43.531499 /usr/lib/systemd/system-generators/torcx-generator[1913]: time="2025-05-08T00:38:43Z" level=info msg="torcx already run" May 8 00:38:43.587226 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:38:43.587420 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:38:43.602771 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:38:43.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661008 kernel: kauditd_printk_skb: 381 callbacks suppressed May 8 00:38:43.661062 kernel: audit: type=1400 audit(1746664723.659:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666047 kernel: audit: type=1400 audit(1746664723.659:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666093 kernel: audit: type=1400 audit(1746664723.659:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670945 kernel: audit: type=1400 audit(1746664723.659:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.671025 kernel: audit: type=1400 audit(1746664723.659:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.675774 kernel: audit: type=1400 audit(1746664723.659:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.675826 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:38:43.675847 kernel: audit: type=1400 audit(1746664723.659:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.678841 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:38:43.678894 kernel: audit: type=1400 audit(1746664723.659:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.660000 audit: BPF prog-id=82 op=LOAD May 8 00:38:43.660000 audit: BPF prog-id=62 op=UNLOAD May 8 00:38:43.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.662000 audit: BPF prog-id=83 op=LOAD May 8 00:38:43.662000 audit: BPF prog-id=78 op=UNLOAD May 8 00:38:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.665000 audit: BPF prog-id=84 op=LOAD May 8 00:38:43.665000 audit: BPF prog-id=43 op=UNLOAD May 8 00:38:43.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit: BPF prog-id=85 op=LOAD May 8 00:38:43.668000 audit: BPF prog-id=44 op=UNLOAD May 8 00:38:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit: BPF prog-id=86 op=LOAD May 8 00:38:43.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.672000 audit: BPF prog-id=87 op=LOAD May 8 00:38:43.672000 audit: BPF prog-id=45 op=UNLOAD May 8 00:38:43.672000 audit: BPF prog-id=46 op=UNLOAD May 8 00:38:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.681000 audit: BPF prog-id=74 op=UNLOAD May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit: BPF prog-id=89 op=LOAD May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit: BPF prog-id=90 op=LOAD May 8 00:38:43.682000 audit: BPF prog-id=47 op=UNLOAD May 8 00:38:43.682000 audit: BPF prog-id=48 op=UNLOAD May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.683000 audit: BPF prog-id=91 op=LOAD May 8 00:38:43.683000 audit: BPF prog-id=49 op=UNLOAD May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit: BPF prog-id=92 op=LOAD May 8 00:38:43.684000 audit: BPF prog-id=58 op=UNLOAD May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit: BPF prog-id=93 op=LOAD May 8 00:38:43.684000 audit: BPF prog-id=50 op=UNLOAD May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.684000 audit: BPF prog-id=94 op=LOAD May 8 00:38:43.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit: BPF prog-id=95 op=LOAD May 8 00:38:43.685000 audit: BPF prog-id=51 op=UNLOAD May 8 00:38:43.685000 audit: BPF prog-id=52 op=UNLOAD May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit: BPF prog-id=96 op=LOAD May 8 00:38:43.686000 audit: BPF prog-id=53 op=UNLOAD May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.686000 audit: BPF prog-id=97 op=LOAD May 8 00:38:43.686000 audit: BPF prog-id=70 op=UNLOAD May 8 00:38:43.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.687000 audit: BPF prog-id=98 op=LOAD May 8 00:38:43.687000 audit: BPF prog-id=54 op=UNLOAD May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit: BPF prog-id=99 op=LOAD May 8 00:38:43.689000 audit: BPF prog-id=55 op=UNLOAD May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit: BPF prog-id=100 op=LOAD May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit: BPF prog-id=101 op=LOAD May 8 00:38:43.689000 audit: BPF prog-id=56 op=UNLOAD May 8 00:38:43.689000 audit: BPF prog-id=57 op=UNLOAD May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.689000 audit: BPF prog-id=102 op=LOAD May 8 00:38:43.689000 audit: BPF prog-id=66 op=UNLOAD May 8 00:38:43.699740 systemd[1]: Stopping kubelet.service... May 8 00:38:43.722087 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:38:43.722280 systemd[1]: Stopped kubelet.service. May 8 00:38:43.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:43.722336 systemd[1]: kubelet.service: Consumed 1.235s CPU time. May 8 00:38:43.724441 systemd[1]: Starting kubelet.service... May 8 00:38:43.812752 systemd[1]: Started kubelet.service. May 8 00:38:43.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:43.847886 kubelet[1954]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:38:43.847886 kubelet[1954]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:38:43.847886 kubelet[1954]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:38:43.848231 kubelet[1954]: I0508 00:38:43.847941 1954 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:38:43.853833 kubelet[1954]: I0508 00:38:43.853795 1954 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:38:43.853833 kubelet[1954]: I0508 00:38:43.853824 1954 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:38:43.854196 kubelet[1954]: I0508 00:38:43.854169 1954 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:38:43.855876 kubelet[1954]: I0508 00:38:43.855853 1954 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:38:43.858112 kubelet[1954]: I0508 00:38:43.858077 1954 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:38:43.860881 kubelet[1954]: E0508 00:38:43.860859 1954 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:38:43.860971 kubelet[1954]: I0508 00:38:43.860957 1954 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:38:43.863441 kubelet[1954]: I0508 00:38:43.863396 1954 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:38:43.863672 kubelet[1954]: I0508 00:38:43.863645 1954 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:38:43.863859 kubelet[1954]: I0508 00:38:43.863679 1954 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:38:43.863859 kubelet[1954]: I0508 00:38:43.863859 1954 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:38:43.863955 kubelet[1954]: I0508 00:38:43.863867 1954 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:38:43.863955 kubelet[1954]: I0508 00:38:43.863907 1954 state_mem.go:36] "Initialized new in-memory state store" May 8 00:38:43.864041 kubelet[1954]: I0508 00:38:43.864024 1954 kubelet.go:446] "Attempting to sync node with API server" May 8 00:38:43.864041 kubelet[1954]: I0508 00:38:43.864038 1954 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:38:43.864096 kubelet[1954]: I0508 00:38:43.864054 1954 kubelet.go:352] "Adding apiserver pod source" May 8 00:38:43.864096 kubelet[1954]: I0508 00:38:43.864065 1954 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:38:43.866760 kubelet[1954]: I0508 00:38:43.866730 1954 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:38:43.867368 kubelet[1954]: I0508 00:38:43.867351 1954 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:38:43.868630 kubelet[1954]: I0508 00:38:43.868605 1954 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:38:43.868710 kubelet[1954]: I0508 00:38:43.868641 1954 server.go:1287] "Started kubelet" May 8 00:38:43.870000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.870000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:43.870000 audit[1954]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000db2120 a1=4000c84750 a2=4000db20f0 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:43.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:43.870000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.870000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:43.870000 audit[1954]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400085a800 a1=4000c84768 a2=4000db21b0 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:43.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:43.871206 kubelet[1954]: I0508 00:38:43.870721 1954 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:38:43.871206 kubelet[1954]: I0508 00:38:43.870776 1954 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:38:43.871206 kubelet[1954]: I0508 00:38:43.870825 1954 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:38:43.873843 kubelet[1954]: I0508 00:38:43.873793 1954 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:38:43.877391 kubelet[1954]: I0508 00:38:43.874849 1954 server.go:490] "Adding debug handlers to kubelet server" May 8 00:38:43.880115 kubelet[1954]: I0508 00:38:43.877548 1954 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:38:43.880115 kubelet[1954]: I0508 00:38:43.878048 1954 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:38:43.880115 kubelet[1954]: I0508 00:38:43.878884 1954 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:38:43.883513 kubelet[1954]: I0508 00:38:43.882990 1954 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:38:43.889864 kubelet[1954]: E0508 00:38:43.885573 1954 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:38:43.889864 kubelet[1954]: I0508 00:38:43.886864 1954 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:38:43.889864 kubelet[1954]: I0508 00:38:43.888565 1954 reconciler.go:26] "Reconciler: start to sync state" May 8 00:38:43.896488 kubelet[1954]: I0508 00:38:43.896453 1954 factory.go:221] Registration of the systemd container factory successfully May 8 00:38:43.897586 kubelet[1954]: I0508 00:38:43.896795 1954 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:38:43.899724 kubelet[1954]: I0508 00:38:43.899693 1954 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:38:43.901006 kubelet[1954]: I0508 00:38:43.900817 1954 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:38:43.901006 kubelet[1954]: I0508 00:38:43.900841 1954 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:38:43.901006 kubelet[1954]: I0508 00:38:43.900860 1954 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:38:43.901006 kubelet[1954]: I0508 00:38:43.900867 1954 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:38:43.901006 kubelet[1954]: E0508 00:38:43.900963 1954 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:38:43.901236 kubelet[1954]: E0508 00:38:43.901203 1954 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:38:43.901678 kubelet[1954]: I0508 00:38:43.901658 1954 factory.go:221] Registration of the containerd container factory successfully May 8 00:38:43.932957 kubelet[1954]: I0508 00:38:43.932928 1954 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:38:43.932957 kubelet[1954]: I0508 00:38:43.932950 1954 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:38:43.933090 kubelet[1954]: I0508 00:38:43.932969 1954 state_mem.go:36] "Initialized new in-memory state store" May 8 00:38:43.933183 kubelet[1954]: I0508 00:38:43.933165 1954 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:38:43.933214 kubelet[1954]: I0508 00:38:43.933183 1954 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:38:43.933214 kubelet[1954]: I0508 00:38:43.933203 1954 policy_none.go:49] "None policy: Start" May 8 00:38:43.933214 kubelet[1954]: I0508 00:38:43.933210 1954 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:38:43.933278 kubelet[1954]: I0508 00:38:43.933221 1954 state_mem.go:35] "Initializing new in-memory state store" May 8 00:38:43.933348 kubelet[1954]: I0508 00:38:43.933338 1954 state_mem.go:75] "Updated machine memory state" May 8 00:38:43.936948 kubelet[1954]: I0508 00:38:43.936919 1954 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:38:43.936000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:43.936000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:38:43.936000 audit[1954]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009983f0 a1=4000ef6588 a2=40009983c0 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:43.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:38:43.937177 kubelet[1954]: I0508 00:38:43.936974 1954 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:38:43.937177 kubelet[1954]: I0508 00:38:43.937093 1954 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:38:43.937177 kubelet[1954]: I0508 00:38:43.937103 1954 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:38:43.937483 kubelet[1954]: I0508 00:38:43.937461 1954 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:38:43.938256 kubelet[1954]: E0508 00:38:43.938236 1954 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:38:44.002386 kubelet[1954]: I0508 00:38:44.002349 1954 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.002887 kubelet[1954]: I0508 00:38:44.002844 1954 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.003622 kubelet[1954]: I0508 00:38:44.003033 1954 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:38:44.040499 kubelet[1954]: I0508 00:38:44.040469 1954 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:38:44.047062 kubelet[1954]: I0508 00:38:44.047017 1954 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 8 00:38:44.047189 kubelet[1954]: I0508 00:38:44.047098 1954 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:38:44.089872 kubelet[1954]: I0508 00:38:44.089771 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.089872 kubelet[1954]: I0508 00:38:44.089807 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:38:44.089872 kubelet[1954]: I0508 00:38:44.089826 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.089872 kubelet[1954]: I0508 00:38:44.089841 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.090722 kubelet[1954]: I0508 00:38:44.089858 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.090722 kubelet[1954]: I0508 00:38:44.090668 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.090722 kubelet[1954]: I0508 00:38:44.090692 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.090722 kubelet[1954]: I0508 00:38:44.090708 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:38:44.090722 kubelet[1954]: I0508 00:38:44.090725 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37c6f054f94ef731052dba816ca970e3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"37c6f054f94ef731052dba816ca970e3\") " pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.308875 kubelet[1954]: E0508 00:38:44.308834 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.309058 kubelet[1954]: E0508 00:38:44.309036 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.309348 kubelet[1954]: E0508 00:38:44.309331 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.865367 kubelet[1954]: I0508 00:38:44.865335 1954 apiserver.go:52] "Watching apiserver" May 8 00:38:44.883960 kubelet[1954]: I0508 00:38:44.883929 1954 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:38:44.915479 kubelet[1954]: I0508 00:38:44.915458 1954 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.915724 kubelet[1954]: E0508 00:38:44.915707 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.915797 kubelet[1954]: E0508 00:38:44.915781 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.920678 kubelet[1954]: E0508 00:38:44.920638 1954 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:38:44.921368 kubelet[1954]: E0508 00:38:44.920782 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:44.951342 kubelet[1954]: I0508 00:38:44.951271 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.95124253 podStartE2EDuration="951.24253ms" podCreationTimestamp="2025-05-08 00:38:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:38:44.941791021 +0000 UTC m=+1.126059044" watchObservedRunningTime="2025-05-08 00:38:44.95124253 +0000 UTC m=+1.135510553" May 8 00:38:44.951732 kubelet[1954]: I0508 00:38:44.951682 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.951613651 podStartE2EDuration="951.613651ms" podCreationTimestamp="2025-05-08 00:38:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:38:44.951614971 +0000 UTC m=+1.135882994" watchObservedRunningTime="2025-05-08 00:38:44.951613651 +0000 UTC m=+1.135881674" May 8 00:38:44.970559 kubelet[1954]: I0508 00:38:44.970469 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.970450428 podStartE2EDuration="970.450428ms" podCreationTimestamp="2025-05-08 00:38:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:38:44.962133963 +0000 UTC m=+1.146401986" watchObservedRunningTime="2025-05-08 00:38:44.970450428 +0000 UTC m=+1.154718451" May 8 00:38:45.917069 kubelet[1954]: E0508 00:38:45.917038 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:45.917392 kubelet[1954]: E0508 00:38:45.917104 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:46.393000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:38:46.393000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000801e80 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:46.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:48.551769 sudo[1359]: pam_unix(sudo:session): session closed for user root May 8 00:38:48.551000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:48.551000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:38:48.553327 sshd[1355]: pam_unix(sshd:session): session closed for user core May 8 00:38:48.554000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:48.554000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:38:48.556555 systemd[1]: sshd@6-10.0.0.58:22-10.0.0.1:54712.service: Deactivated successfully. May 8 00:38:48.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.58:22-10.0.0.1:54712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:38:48.557361 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:38:48.557525 systemd[1]: session-7.scope: Consumed 6.585s CPU time. May 8 00:38:48.557913 systemd-logind[1212]: Session 7 logged out. Waiting for processes to exit. May 8 00:38:48.562701 systemd-logind[1212]: Removed session 7. May 8 00:38:50.393000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.394653 kernel: kauditd_printk_skb: 272 callbacks suppressed May 8 00:38:50.394708 kernel: audit: type=1400 audit(1746664730.393:812): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.393000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010184e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.404325 kernel: audit: type=1300 audit(1746664730.393:812): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010184e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.410086 kernel: audit: type=1327 audit(1746664730.393:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.410248 kernel: audit: type=1400 audit(1746664730.393:813): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.393000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.393000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001018520 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.419012 kernel: audit: type=1300 audit(1746664730.393:813): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001018520 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.419076 kernel: audit: type=1327 audit(1746664730.393:813): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.394000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.428024 kernel: audit: type=1400 audit(1746664730.394:814): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.428107 kernel: audit: type=1300 audit(1746664730.394:814): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001018aa0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.394000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001018aa0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.434077 kernel: audit: type=1327 audit(1746664730.394:814): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.395000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.445485 kernel: audit: type=1400 audit(1746664730.395:815): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:38:50.395000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001018de0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:38:50.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:38:50.589064 kubelet[1954]: I0508 00:38:50.589036 1954 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:38:50.589400 env[1220]: time="2025-05-08T00:38:50.589359360Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:38:50.589791 kubelet[1954]: I0508 00:38:50.589772 1954 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:38:51.464354 systemd[1]: Created slice kubepods-besteffort-pod4ee1c0c4_9f9c_44ac_ba83_5fe8f3160734.slice. May 8 00:38:51.543011 kubelet[1954]: I0508 00:38:51.542956 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734-kube-proxy\") pod \"kube-proxy-n24m4\" (UID: \"4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734\") " pod="kube-system/kube-proxy-n24m4" May 8 00:38:51.543011 kubelet[1954]: I0508 00:38:51.543000 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734-xtables-lock\") pod \"kube-proxy-n24m4\" (UID: \"4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734\") " pod="kube-system/kube-proxy-n24m4" May 8 00:38:51.543197 kubelet[1954]: I0508 00:38:51.543043 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jkpg9\" (UniqueName: \"kubernetes.io/projected/4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734-kube-api-access-jkpg9\") pod \"kube-proxy-n24m4\" (UID: \"4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734\") " pod="kube-system/kube-proxy-n24m4" May 8 00:38:51.543197 kubelet[1954]: I0508 00:38:51.543068 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734-lib-modules\") pod \"kube-proxy-n24m4\" (UID: \"4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734\") " pod="kube-system/kube-proxy-n24m4" May 8 00:38:51.625127 kubelet[1954]: E0508 00:38:51.625093 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:51.626093 systemd[1]: Created slice kubepods-besteffort-poddbccc719_b9ca_4092_a14e_75eeecdca0b3.slice. May 8 00:38:51.643582 kubelet[1954]: I0508 00:38:51.643530 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dbccc719-b9ca-4092-a14e-75eeecdca0b3-var-lib-calico\") pod \"tigera-operator-789496d6f5-czjcz\" (UID: \"dbccc719-b9ca-4092-a14e-75eeecdca0b3\") " pod="tigera-operator/tigera-operator-789496d6f5-czjcz" May 8 00:38:51.643695 kubelet[1954]: I0508 00:38:51.643611 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2fmp\" (UniqueName: \"kubernetes.io/projected/dbccc719-b9ca-4092-a14e-75eeecdca0b3-kube-api-access-w2fmp\") pod \"tigera-operator-789496d6f5-czjcz\" (UID: \"dbccc719-b9ca-4092-a14e-75eeecdca0b3\") " pod="tigera-operator/tigera-operator-789496d6f5-czjcz" May 8 00:38:51.650805 kubelet[1954]: I0508 00:38:51.650753 1954 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:38:51.774551 kubelet[1954]: E0508 00:38:51.774460 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:51.775237 env[1220]: time="2025-05-08T00:38:51.775184483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n24m4,Uid:4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734,Namespace:kube-system,Attempt:0,}" May 8 00:38:51.787170 env[1220]: time="2025-05-08T00:38:51.787105426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:51.787256 env[1220]: time="2025-05-08T00:38:51.787179226Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:51.787256 env[1220]: time="2025-05-08T00:38:51.787212306Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:51.787414 env[1220]: time="2025-05-08T00:38:51.787379947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7dc7123e1e58732460f0fa88ccafef308ba5aae37c72044d88b4bc524b695321 pid=2049 runtime=io.containerd.runc.v2 May 8 00:38:51.801275 systemd[1]: Started cri-containerd-7dc7123e1e58732460f0fa88ccafef308ba5aae37c72044d88b4bc524b695321.scope. May 8 00:38:51.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit: BPF prog-id=103 op=LOAD May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633731323365316535383733323436306630666138386363616665 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633731323365316535383733323436306630666138386363616665 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.836000 audit: BPF prog-id=104 op=LOAD May 8 00:38:51.836000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633731323365316535383733323436306630666138386363616665 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.837000 audit: BPF prog-id=105 op=LOAD May 8 00:38:51.837000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633731323365316535383733323436306630666138386363616665 May 8 00:38:51.838000 audit: BPF prog-id=105 op=UNLOAD May 8 00:38:51.838000 audit: BPF prog-id=104 op=UNLOAD May 8 00:38:51.838000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.838000 audit: BPF prog-id=106 op=LOAD May 8 00:38:51.838000 audit[2059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633731323365316535383733323436306630666138386363616665 May 8 00:38:51.847984 env[1220]: time="2025-05-08T00:38:51.847943505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n24m4,Uid:4ee1c0c4-9f9c-44ac-ba83-5fe8f3160734,Namespace:kube-system,Attempt:0,} returns sandbox id \"7dc7123e1e58732460f0fa88ccafef308ba5aae37c72044d88b4bc524b695321\"" May 8 00:38:51.848580 kubelet[1954]: E0508 00:38:51.848553 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:51.851256 env[1220]: time="2025-05-08T00:38:51.851222351Z" level=info msg="CreateContainer within sandbox \"7dc7123e1e58732460f0fa88ccafef308ba5aae37c72044d88b4bc524b695321\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:38:51.862497 env[1220]: time="2025-05-08T00:38:51.862457933Z" level=info msg="CreateContainer within sandbox \"7dc7123e1e58732460f0fa88ccafef308ba5aae37c72044d88b4bc524b695321\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c1139a9767cbf628e34c972b5e190c80d18215a5cd2af820d4635835a428a141\"" May 8 00:38:51.863318 env[1220]: time="2025-05-08T00:38:51.863292574Z" level=info msg="StartContainer for \"c1139a9767cbf628e34c972b5e190c80d18215a5cd2af820d4635835a428a141\"" May 8 00:38:51.877757 systemd[1]: Started cri-containerd-c1139a9767cbf628e34c972b5e190c80d18215a5cd2af820d4635835a428a141.scope. May 8 00:38:51.899000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.899000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2049 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313339613937363763626636323865333463393732623565313930 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit: BPF prog-id=107 op=LOAD May 8 00:38:51.900000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2049 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313339613937363763626636323865333463393732623565313930 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.900000 audit: BPF prog-id=108 op=LOAD May 8 00:38:51.900000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2049 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313339613937363763626636323865333463393732623565313930 May 8 00:38:51.901000 audit: BPF prog-id=108 op=UNLOAD May 8 00:38:51.901000 audit: BPF prog-id=107 op=UNLOAD May 8 00:38:51.901000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.901000 audit: BPF prog-id=109 op=LOAD May 8 00:38:51.901000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2049 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331313339613937363763626636323865333463393732623565313930 May 8 00:38:51.926255 env[1220]: time="2025-05-08T00:38:51.925976656Z" level=info msg="StartContainer for \"c1139a9767cbf628e34c972b5e190c80d18215a5cd2af820d4635835a428a141\" returns successfully" May 8 00:38:51.929085 env[1220]: time="2025-05-08T00:38:51.929011542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-czjcz,Uid:dbccc719-b9ca-4092-a14e-75eeecdca0b3,Namespace:tigera-operator,Attempt:0,}" May 8 00:38:51.931131 kubelet[1954]: E0508 00:38:51.931015 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:51.941408 env[1220]: time="2025-05-08T00:38:51.941309006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:51.941408 env[1220]: time="2025-05-08T00:38:51.941379126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:51.941584 env[1220]: time="2025-05-08T00:38:51.941397326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:51.941817 env[1220]: time="2025-05-08T00:38:51.941763527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9e0fd76cf3a3011fa16e5842b82efa12ef9c63c25d132bc0adf944872487791 pid=2124 runtime=io.containerd.runc.v2 May 8 00:38:51.953113 systemd[1]: Started cri-containerd-a9e0fd76cf3a3011fa16e5842b82efa12ef9c63c25d132bc0adf944872487791.scope. May 8 00:38:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.980000 audit: BPF prog-id=110 op=LOAD May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2124 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139653066643736636633613330313166613136653538343262383265 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2124 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139653066643736636633613330313166613136653538343262383265 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.981000 audit: BPF prog-id=111 op=LOAD May 8 00:38:51.981000 audit[2135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2124 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139653066643736636633613330313166613136653538343262383265 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit: BPF prog-id=112 op=LOAD May 8 00:38:51.982000 audit[2135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2124 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139653066643736636633613330313166613136653538343262383265 May 8 00:38:51.982000 audit: BPF prog-id=112 op=UNLOAD May 8 00:38:51.982000 audit: BPF prog-id=111 op=UNLOAD May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:51.982000 audit: BPF prog-id=113 op=LOAD May 8 00:38:51.982000 audit[2135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2124 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:51.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139653066643736636633613330313166613136653538343262383265 May 8 00:38:52.001153 env[1220]: time="2025-05-08T00:38:52.001107923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-czjcz,Uid:dbccc719-b9ca-4092-a14e-75eeecdca0b3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a9e0fd76cf3a3011fa16e5842b82efa12ef9c63c25d132bc0adf944872487791\"" May 8 00:38:52.002706 env[1220]: time="2025-05-08T00:38:52.002654286Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:38:52.129000 audit[2192]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.129000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccd6b6f0 a2=0 a3=1 items=0 ppid=2099 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:38:52.129000 audit[2193]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.129000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe84a4b20 a2=0 a3=1 items=0 ppid=2099 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:38:52.131000 audit[2194]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.131000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8198370 a2=0 a3=1 items=0 ppid=2099 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:38:52.133000 audit[2195]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.133000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffac83b50 a2=0 a3=1 items=0 ppid=2099 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:38:52.135000 audit[2197]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.135000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd542a3d0 a2=0 a3=1 items=0 ppid=2099 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:38:52.136000 audit[2196]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.136000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd213df60 a2=0 a3=1 items=0 ppid=2099 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:38:52.231000 audit[2198]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.231000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffcf5f840 a2=0 a3=1 items=0 ppid=2099 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:38:52.235000 audit[2200]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.235000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcfe9f3c0 a2=0 a3=1 items=0 ppid=2099 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:38:52.238000 audit[2203]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.238000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeb474e70 a2=0 a3=1 items=0 ppid=2099 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:38:52.239000 audit[2204]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.239000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa9e1700 a2=0 a3=1 items=0 ppid=2099 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:38:52.242000 audit[2206]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.242000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff31dc5a0 a2=0 a3=1 items=0 ppid=2099 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:38:52.243000 audit[2207]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.243000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8118190 a2=0 a3=1 items=0 ppid=2099 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:38:52.245000 audit[2209]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.245000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffebf52310 a2=0 a3=1 items=0 ppid=2099 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:38:52.248000 audit[2212]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.248000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff3941610 a2=0 a3=1 items=0 ppid=2099 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:38:52.249000 audit[2213]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.249000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf72b510 a2=0 a3=1 items=0 ppid=2099 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:38:52.251000 audit[2215]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.251000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb2318b0 a2=0 a3=1 items=0 ppid=2099 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:38:52.252000 audit[2216]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.252000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0d46e20 a2=0 a3=1 items=0 ppid=2099 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:38:52.254000 audit[2218]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.254000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd94acbf0 a2=0 a3=1 items=0 ppid=2099 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:38:52.257000 audit[2221]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.257000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2bdfaa0 a2=0 a3=1 items=0 ppid=2099 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:38:52.261000 audit[2224]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.261000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe301a9c0 a2=0 a3=1 items=0 ppid=2099 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:38:52.262000 audit[2225]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.262000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc76986d0 a2=0 a3=1 items=0 ppid=2099 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:38:52.264000 audit[2227]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.264000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffcc0cb980 a2=0 a3=1 items=0 ppid=2099 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:38:52.267000 audit[2230]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.267000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb8f8e20 a2=0 a3=1 items=0 ppid=2099 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:38:52.268000 audit[2231]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.268000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcad28f70 a2=0 a3=1 items=0 ppid=2099 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:38:52.270000 audit[2233]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:38:52.270000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff87d7d20 a2=0 a3=1 items=0 ppid=2099 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:38:52.292000 audit[2239]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:52.292000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc5ad0380 a2=0 a3=1 items=0 ppid=2099 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:52.303000 audit[2239]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:52.303000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc5ad0380 a2=0 a3=1 items=0 ppid=2099 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:52.304000 audit[2244]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.304000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd3190580 a2=0 a3=1 items=0 ppid=2099 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:38:52.306000 audit[2246]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.306000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdb9ce0c0 a2=0 a3=1 items=0 ppid=2099 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:38:52.309000 audit[2249]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.309000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc3930990 a2=0 a3=1 items=0 ppid=2099 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:38:52.310000 audit[2250]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.310000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedc1dfc0 a2=0 a3=1 items=0 ppid=2099 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:38:52.312000 audit[2252]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.312000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd64e1dd0 a2=0 a3=1 items=0 ppid=2099 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:38:52.313000 audit[2253]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.313000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed3a6760 a2=0 a3=1 items=0 ppid=2099 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:38:52.315000 audit[2255]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.315000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffce589b60 a2=0 a3=1 items=0 ppid=2099 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:38:52.318000 audit[2258]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.318000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe685e8e0 a2=0 a3=1 items=0 ppid=2099 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:38:52.319000 audit[2259]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.319000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbc7d9a0 a2=0 a3=1 items=0 ppid=2099 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:38:52.321000 audit[2261]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.321000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf0d6760 a2=0 a3=1 items=0 ppid=2099 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:38:52.322000 audit[2262]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.322000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde93d690 a2=0 a3=1 items=0 ppid=2099 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:38:52.324000 audit[2264]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.324000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc10882d0 a2=0 a3=1 items=0 ppid=2099 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:38:52.329000 audit[2267]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.329000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdaa3b390 a2=0 a3=1 items=0 ppid=2099 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:38:52.332000 audit[2270]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.332000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0447850 a2=0 a3=1 items=0 ppid=2099 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:38:52.333000 audit[2271]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.333000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb19c3d0 a2=0 a3=1 items=0 ppid=2099 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:38:52.335000 audit[2273]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.335000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffccb4a890 a2=0 a3=1 items=0 ppid=2099 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:38:52.337000 audit[2276]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.337000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe7619fd0 a2=0 a3=1 items=0 ppid=2099 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:38:52.338000 audit[2277]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.338000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeef36c60 a2=0 a3=1 items=0 ppid=2099 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:38:52.340000 audit[2279]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.340000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffef850fe0 a2=0 a3=1 items=0 ppid=2099 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:38:52.341000 audit[2280]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.341000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe661cae0 a2=0 a3=1 items=0 ppid=2099 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:38:52.343000 audit[2282]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.343000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe4c03820 a2=0 a3=1 items=0 ppid=2099 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:38:52.346000 audit[2285]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:38:52.346000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffed5644d0 a2=0 a3=1 items=0 ppid=2099 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:38:52.350000 audit[2287]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:38:52.350000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd5170b00 a2=0 a3=1 items=0 ppid=2099 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.350000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:52.351000 audit[2287]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:38:52.351000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd5170b00 a2=0 a3=1 items=0 ppid=2099 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:52.351000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:52.933313 kubelet[1954]: E0508 00:38:52.933288 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:52.941238 kubelet[1954]: I0508 00:38:52.941177 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-n24m4" podStartSLOduration=1.9411620790000002 podStartE2EDuration="1.941162079s" podCreationTimestamp="2025-05-08 00:38:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:38:52.941037279 +0000 UTC m=+9.125305302" watchObservedRunningTime="2025-05-08 00:38:52.941162079 +0000 UTC m=+9.125430102" May 8 00:38:52.972927 kubelet[1954]: E0508 00:38:52.972889 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:53.425949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307412820.mount: Deactivated successfully. May 8 00:38:53.891059 env[1220]: time="2025-05-08T00:38:53.891015351Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:53.892358 env[1220]: time="2025-05-08T00:38:53.892323234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:53.894308 env[1220]: time="2025-05-08T00:38:53.894271397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:53.895598 env[1220]: time="2025-05-08T00:38:53.895566199Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:53.896320 env[1220]: time="2025-05-08T00:38:53.896287400Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 8 00:38:53.900121 env[1220]: time="2025-05-08T00:38:53.900088767Z" level=info msg="CreateContainer within sandbox \"a9e0fd76cf3a3011fa16e5842b82efa12ef9c63c25d132bc0adf944872487791\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:38:53.912049 env[1220]: time="2025-05-08T00:38:53.912004347Z" level=info msg="CreateContainer within sandbox \"a9e0fd76cf3a3011fa16e5842b82efa12ef9c63c25d132bc0adf944872487791\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"29993ce959558d3490e4a12aa70e050e6be901fda805751a8adf0dd2911a8d6a\"" May 8 00:38:53.913418 env[1220]: time="2025-05-08T00:38:53.912605868Z" level=info msg="StartContainer for \"29993ce959558d3490e4a12aa70e050e6be901fda805751a8adf0dd2911a8d6a\"" May 8 00:38:53.928679 systemd[1]: Started cri-containerd-29993ce959558d3490e4a12aa70e050e6be901fda805751a8adf0dd2911a8d6a.scope. May 8 00:38:53.938182 kubelet[1954]: E0508 00:38:53.937577 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:53.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.964000 audit: BPF prog-id=114 op=LOAD May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2124 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393933636539353935353864333439306534613132616137306530 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2124 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393933636539353935353864333439306534613132616137306530 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit: BPF prog-id=115 op=LOAD May 8 00:38:53.965000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2124 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393933636539353935353864333439306534613132616137306530 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.965000 audit: BPF prog-id=116 op=LOAD May 8 00:38:53.965000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2124 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393933636539353935353864333439306534613132616137306530 May 8 00:38:53.965000 audit: BPF prog-id=116 op=UNLOAD May 8 00:38:53.966000 audit: BPF prog-id=115 op=UNLOAD May 8 00:38:53.966000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:53.966000 audit: BPF prog-id=117 op=LOAD May 8 00:38:53.966000 audit[2296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2124 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:53.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393933636539353935353864333439306534613132616137306530 May 8 00:38:54.001510 env[1220]: time="2025-05-08T00:38:54.001449820Z" level=info msg="StartContainer for \"29993ce959558d3490e4a12aa70e050e6be901fda805751a8adf0dd2911a8d6a\" returns successfully" May 8 00:38:54.222130 kubelet[1954]: E0508 00:38:54.221918 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:54.939773 kubelet[1954]: E0508 00:38:54.939744 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:55.392695 update_engine[1214]: I0508 00:38:55.392645 1214 update_attempter.cc:509] Updating boot flags... May 8 00:38:55.941105 kubelet[1954]: E0508 00:38:55.941062 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:57.270000 audit[2342]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.273506 kernel: kauditd_printk_skb: 369 callbacks suppressed May 8 00:38:57.273641 kernel: audit: type=1325 audit(1746664737.270:927): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.273670 kernel: audit: type=1300 audit(1746664737.270:927): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe5ff8ea0 a2=0 a3=1 items=0 ppid=2099 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.270000 audit[2342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe5ff8ea0 a2=0 a3=1 items=0 ppid=2099 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.279551 kernel: audit: type=1327 audit(1746664737.270:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.281000 audit[2342]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.281000 audit[2342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe5ff8ea0 a2=0 a3=1 items=0 ppid=2099 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.288206 kernel: audit: type=1325 audit(1746664737.281:928): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.288333 kernel: audit: type=1300 audit(1746664737.281:928): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe5ff8ea0 a2=0 a3=1 items=0 ppid=2099 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.290499 kernel: audit: type=1327 audit(1746664737.281:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.298000 audit[2344]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.298000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe96c1bd0 a2=0 a3=1 items=0 ppid=2099 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.304729 kernel: audit: type=1325 audit(1746664737.298:929): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.304789 kernel: audit: type=1300 audit(1746664737.298:929): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe96c1bd0 a2=0 a3=1 items=0 ppid=2099 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.304827 kernel: audit: type=1327 audit(1746664737.298:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.310000 audit[2344]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.310000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe96c1bd0 a2=0 a3=1 items=0 ppid=2099 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:57.313632 kernel: audit: type=1325 audit(1746664737.310:930): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:57.428496 kubelet[1954]: I0508 00:38:57.428383 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-czjcz" podStartSLOduration=4.533346546 podStartE2EDuration="6.428353503s" podCreationTimestamp="2025-05-08 00:38:51 +0000 UTC" firstStartedPulling="2025-05-08 00:38:52.002239045 +0000 UTC m=+8.186507068" lastFinishedPulling="2025-05-08 00:38:53.897246042 +0000 UTC m=+10.081514025" observedRunningTime="2025-05-08 00:38:54.948019299 +0000 UTC m=+11.132287322" watchObservedRunningTime="2025-05-08 00:38:57.428353503 +0000 UTC m=+13.612621526" May 8 00:38:57.435096 systemd[1]: Created slice kubepods-besteffort-pod5da8668f_94b9_49aa_8cf3_1a043b29d848.slice. May 8 00:38:57.485633 kubelet[1954]: I0508 00:38:57.485546 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5da8668f-94b9-49aa-8cf3-1a043b29d848-typha-certs\") pod \"calico-typha-6bb7796c84-jjrvw\" (UID: \"5da8668f-94b9-49aa-8cf3-1a043b29d848\") " pod="calico-system/calico-typha-6bb7796c84-jjrvw" May 8 00:38:57.485633 kubelet[1954]: I0508 00:38:57.485614 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qzhdg\" (UniqueName: \"kubernetes.io/projected/5da8668f-94b9-49aa-8cf3-1a043b29d848-kube-api-access-qzhdg\") pod \"calico-typha-6bb7796c84-jjrvw\" (UID: \"5da8668f-94b9-49aa-8cf3-1a043b29d848\") " pod="calico-system/calico-typha-6bb7796c84-jjrvw" May 8 00:38:57.485830 kubelet[1954]: I0508 00:38:57.485688 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5da8668f-94b9-49aa-8cf3-1a043b29d848-tigera-ca-bundle\") pod \"calico-typha-6bb7796c84-jjrvw\" (UID: \"5da8668f-94b9-49aa-8cf3-1a043b29d848\") " pod="calico-system/calico-typha-6bb7796c84-jjrvw" May 8 00:38:57.496354 systemd[1]: Created slice kubepods-besteffort-pod321e9217_6355_41cf_a734_a461ffe14bc1.slice. May 8 00:38:57.586192 kubelet[1954]: I0508 00:38:57.586028 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-lib-modules\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586192 kubelet[1954]: I0508 00:38:57.586090 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-var-run-calico\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586192 kubelet[1954]: I0508 00:38:57.586110 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-flexvol-driver-host\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586192 kubelet[1954]: I0508 00:38:57.586165 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/321e9217-6355-41cf-a734-a461ffe14bc1-node-certs\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586192 kubelet[1954]: I0508 00:38:57.586184 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-var-lib-calico\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586644 kubelet[1954]: I0508 00:38:57.586203 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-cni-bin-dir\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586644 kubelet[1954]: I0508 00:38:57.586250 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-xtables-lock\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586644 kubelet[1954]: I0508 00:38:57.586280 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-policysync\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586644 kubelet[1954]: I0508 00:38:57.586303 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/321e9217-6355-41cf-a734-a461ffe14bc1-tigera-ca-bundle\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586644 kubelet[1954]: I0508 00:38:57.586324 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mcplt\" (UniqueName: \"kubernetes.io/projected/321e9217-6355-41cf-a734-a461ffe14bc1-kube-api-access-mcplt\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586772 kubelet[1954]: I0508 00:38:57.586342 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-cni-net-dir\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.586772 kubelet[1954]: I0508 00:38:57.586360 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/321e9217-6355-41cf-a734-a461ffe14bc1-cni-log-dir\") pod \"calico-node-bs55k\" (UID: \"321e9217-6355-41cf-a734-a461ffe14bc1\") " pod="calico-system/calico-node-bs55k" May 8 00:38:57.608386 kubelet[1954]: E0508 00:38:57.608328 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:38:57.687522 kubelet[1954]: I0508 00:38:57.687467 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k57lj\" (UniqueName: \"kubernetes.io/projected/d3d376fe-5d96-47d8-8530-176f83a0cb2e-kube-api-access-k57lj\") pod \"csi-node-driver-zl96g\" (UID: \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\") " pod="calico-system/csi-node-driver-zl96g" May 8 00:38:57.687690 kubelet[1954]: I0508 00:38:57.687570 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d3d376fe-5d96-47d8-8530-176f83a0cb2e-registration-dir\") pod \"csi-node-driver-zl96g\" (UID: \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\") " pod="calico-system/csi-node-driver-zl96g" May 8 00:38:57.687690 kubelet[1954]: I0508 00:38:57.687625 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d3d376fe-5d96-47d8-8530-176f83a0cb2e-kubelet-dir\") pod \"csi-node-driver-zl96g\" (UID: \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\") " pod="calico-system/csi-node-driver-zl96g" May 8 00:38:57.687751 kubelet[1954]: I0508 00:38:57.687710 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d3d376fe-5d96-47d8-8530-176f83a0cb2e-socket-dir\") pod \"csi-node-driver-zl96g\" (UID: \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\") " pod="calico-system/csi-node-driver-zl96g" May 8 00:38:57.687751 kubelet[1954]: I0508 00:38:57.687729 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d3d376fe-5d96-47d8-8530-176f83a0cb2e-varrun\") pod \"csi-node-driver-zl96g\" (UID: \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\") " pod="calico-system/csi-node-driver-zl96g" May 8 00:38:57.688878 kubelet[1954]: E0508 00:38:57.688844 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.688878 kubelet[1954]: W0508 00:38:57.688867 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.689019 kubelet[1954]: E0508 00:38:57.688896 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.693408 kubelet[1954]: E0508 00:38:57.693089 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.693408 kubelet[1954]: W0508 00:38:57.693113 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.693408 kubelet[1954]: E0508 00:38:57.693131 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.702425 kubelet[1954]: E0508 00:38:57.702363 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.702425 kubelet[1954]: W0508 00:38:57.702403 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.702425 kubelet[1954]: E0508 00:38:57.702423 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.738947 kubelet[1954]: E0508 00:38:57.738907 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:57.739633 env[1220]: time="2025-05-08T00:38:57.739362994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bb7796c84-jjrvw,Uid:5da8668f-94b9-49aa-8cf3-1a043b29d848,Namespace:calico-system,Attempt:0,}" May 8 00:38:57.773959 env[1220]: time="2025-05-08T00:38:57.773895080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:57.773959 env[1220]: time="2025-05-08T00:38:57.773937480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:57.773959 env[1220]: time="2025-05-08T00:38:57.773948520Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:57.774249 env[1220]: time="2025-05-08T00:38:57.774222281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4559202dfd539a398fd5ec66ab74078e9692d191d30d39661a07e02015a36140 pid=2360 runtime=io.containerd.runc.v2 May 8 00:38:57.790799 kubelet[1954]: E0508 00:38:57.790770 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.791179 kubelet[1954]: W0508 00:38:57.791154 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.791548 kubelet[1954]: E0508 00:38:57.791524 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.794271 kubelet[1954]: E0508 00:38:57.794248 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.794403 kubelet[1954]: W0508 00:38:57.794384 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.794486 kubelet[1954]: E0508 00:38:57.794472 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.796664 systemd[1]: Started cri-containerd-4559202dfd539a398fd5ec66ab74078e9692d191d30d39661a07e02015a36140.scope. May 8 00:38:57.797278 kubelet[1954]: E0508 00:38:57.797258 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.797418 kubelet[1954]: W0508 00:38:57.797401 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.797512 kubelet[1954]: E0508 00:38:57.797494 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.797815 kubelet[1954]: E0508 00:38:57.797790 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.797815 kubelet[1954]: W0508 00:38:57.797809 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.797912 kubelet[1954]: E0508 00:38:57.797825 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.798041 kubelet[1954]: E0508 00:38:57.798020 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.798041 kubelet[1954]: W0508 00:38:57.798034 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.798168 kubelet[1954]: E0508 00:38:57.798142 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.798240 kubelet[1954]: E0508 00:38:57.798224 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.798240 kubelet[1954]: W0508 00:38:57.798235 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.798321 kubelet[1954]: E0508 00:38:57.798306 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.798475 kubelet[1954]: E0508 00:38:57.798456 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:57.799424 kubelet[1954]: E0508 00:38:57.799382 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.799424 kubelet[1954]: W0508 00:38:57.799403 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.799424 kubelet[1954]: E0508 00:38:57.799418 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.799819 kubelet[1954]: E0508 00:38:57.799785 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.799819 kubelet[1954]: W0508 00:38:57.799813 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.799931 kubelet[1954]: E0508 00:38:57.799910 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.800374 kubelet[1954]: E0508 00:38:57.800338 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.800448 kubelet[1954]: W0508 00:38:57.800387 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.800484 kubelet[1954]: E0508 00:38:57.800458 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.800772 kubelet[1954]: E0508 00:38:57.800751 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.800842 kubelet[1954]: W0508 00:38:57.800787 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.800876 kubelet[1954]: E0508 00:38:57.800869 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.801146 env[1220]: time="2025-05-08T00:38:57.801093916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bs55k,Uid:321e9217-6355-41cf-a734-a461ffe14bc1,Namespace:calico-system,Attempt:0,}" May 8 00:38:57.801400 kubelet[1954]: E0508 00:38:57.801351 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.801400 kubelet[1954]: W0508 00:38:57.801398 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.801564 kubelet[1954]: E0508 00:38:57.801540 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.802396 kubelet[1954]: E0508 00:38:57.801984 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.802396 kubelet[1954]: W0508 00:38:57.802002 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.802396 kubelet[1954]: E0508 00:38:57.802127 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.802396 kubelet[1954]: E0508 00:38:57.802319 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.802396 kubelet[1954]: W0508 00:38:57.802329 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.802630 kubelet[1954]: E0508 00:38:57.802583 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.803754 kubelet[1954]: E0508 00:38:57.803730 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.803754 kubelet[1954]: W0508 00:38:57.803746 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.803844 kubelet[1954]: E0508 00:38:57.803814 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.803966 kubelet[1954]: E0508 00:38:57.803940 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.803966 kubelet[1954]: W0508 00:38:57.803954 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.804032 kubelet[1954]: E0508 00:38:57.803984 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.804134 kubelet[1954]: E0508 00:38:57.804107 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.804134 kubelet[1954]: W0508 00:38:57.804119 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.804233 kubelet[1954]: E0508 00:38:57.804189 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.804262 kubelet[1954]: E0508 00:38:57.804253 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.804262 kubelet[1954]: W0508 00:38:57.804259 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.804335 kubelet[1954]: E0508 00:38:57.804316 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.804387 kubelet[1954]: E0508 00:38:57.804382 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.804423 kubelet[1954]: W0508 00:38:57.804390 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.804423 kubelet[1954]: E0508 00:38:57.804400 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.804628 kubelet[1954]: E0508 00:38:57.804583 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.804685 kubelet[1954]: W0508 00:38:57.804632 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.804685 kubelet[1954]: E0508 00:38:57.804650 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.805465 kubelet[1954]: E0508 00:38:57.805445 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.805923 kubelet[1954]: W0508 00:38:57.805904 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.806035 kubelet[1954]: E0508 00:38:57.806017 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.806324 kubelet[1954]: E0508 00:38:57.806307 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.806769 kubelet[1954]: W0508 00:38:57.806323 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.806769 kubelet[1954]: E0508 00:38:57.806353 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.806769 kubelet[1954]: E0508 00:38:57.806657 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.806769 kubelet[1954]: W0508 00:38:57.806670 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.806894 kubelet[1954]: E0508 00:38:57.806780 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.806894 kubelet[1954]: E0508 00:38:57.806861 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.806894 kubelet[1954]: W0508 00:38:57.806869 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.807042 kubelet[1954]: E0508 00:38:57.806939 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.812727 kubelet[1954]: E0508 00:38:57.812701 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.812906 kubelet[1954]: W0508 00:38:57.812887 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.812985 kubelet[1954]: E0508 00:38:57.812970 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.813326 kubelet[1954]: E0508 00:38:57.813310 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.813436 kubelet[1954]: W0508 00:38:57.813421 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.813509 kubelet[1954]: E0508 00:38:57.813497 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.815749 kubelet[1954]: E0508 00:38:57.815731 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:57.815749 kubelet[1954]: W0508 00:38:57.815747 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:57.815845 kubelet[1954]: E0508 00:38:57.815766 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:57.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.821000 audit: BPF prog-id=118 op=LOAD May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2360 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353932303264666435333961333938666435656336366162373430 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2360 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353932303264666435333961333938666435656336366162373430 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit: BPF prog-id=119 op=LOAD May 8 00:38:57.822000 audit[2369]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2360 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353932303264666435333961333938666435656336366162373430 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit: BPF prog-id=120 op=LOAD May 8 00:38:57.822000 audit[2369]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2360 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353932303264666435333961333938666435656336366162373430 May 8 00:38:57.822000 audit: BPF prog-id=120 op=UNLOAD May 8 00:38:57.822000 audit: BPF prog-id=119 op=UNLOAD May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.822000 audit: BPF prog-id=121 op=LOAD May 8 00:38:57.822000 audit[2369]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2360 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353932303264666435333961333938666435656336366162373430 May 8 00:38:57.844125 env[1220]: time="2025-05-08T00:38:57.844014933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bb7796c84-jjrvw,Uid:5da8668f-94b9-49aa-8cf3-1a043b29d848,Namespace:calico-system,Attempt:0,} returns sandbox id \"4559202dfd539a398fd5ec66ab74078e9692d191d30d39661a07e02015a36140\"" May 8 00:38:57.845095 kubelet[1954]: E0508 00:38:57.844943 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:57.846526 env[1220]: time="2025-05-08T00:38:57.846489976Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:38:57.852626 env[1220]: time="2025-05-08T00:38:57.852510904Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:38:57.852626 env[1220]: time="2025-05-08T00:38:57.852558544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:38:57.852626 env[1220]: time="2025-05-08T00:38:57.852568984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:38:57.852840 env[1220]: time="2025-05-08T00:38:57.852718944Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66 pid=2427 runtime=io.containerd.runc.v2 May 8 00:38:57.862539 systemd[1]: Started cri-containerd-60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66.scope. May 8 00:38:57.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.887000 audit: BPF prog-id=122 op=LOAD May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630353133623934393862336632343239656639363138393763653631 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630353133623934393862336632343239656639363138393763653631 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit: BPF prog-id=123 op=LOAD May 8 00:38:57.889000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630353133623934393862336632343239656639363138393763653631 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit: BPF prog-id=124 op=LOAD May 8 00:38:57.889000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630353133623934393862336632343239656639363138393763653631 May 8 00:38:57.889000 audit: BPF prog-id=124 op=UNLOAD May 8 00:38:57.889000 audit: BPF prog-id=123 op=UNLOAD May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:57.889000 audit: BPF prog-id=125 op=LOAD May 8 00:38:57.889000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:57.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630353133623934393862336632343239656639363138393763653631 May 8 00:38:57.912208 env[1220]: time="2025-05-08T00:38:57.912162423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bs55k,Uid:321e9217-6355-41cf-a734-a461ffe14bc1,Namespace:calico-system,Attempt:0,} returns sandbox id \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\"" May 8 00:38:57.912879 kubelet[1954]: E0508 00:38:57.912855 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:58.326000 audit[2461]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:58.326000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc1ff7920 a2=0 a3=1 items=0 ppid=2099 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:58.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:58.332000 audit[2461]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:38:58.332000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc1ff7920 a2=0 a3=1 items=0 ppid=2099 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:58.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:38:58.901283 kubelet[1954]: E0508 00:38:58.901200 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:38:59.533742 env[1220]: time="2025-05-08T00:38:59.533650879Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:59.535192 env[1220]: time="2025-05-08T00:38:59.535159241Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:59.537025 env[1220]: time="2025-05-08T00:38:59.536994963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:59.538197 env[1220]: time="2025-05-08T00:38:59.538161204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:38:59.538769 env[1220]: time="2025-05-08T00:38:59.538740005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 8 00:38:59.540328 env[1220]: time="2025-05-08T00:38:59.539841246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:38:59.549897 env[1220]: time="2025-05-08T00:38:59.549861458Z" level=info msg="CreateContainer within sandbox \"4559202dfd539a398fd5ec66ab74078e9692d191d30d39661a07e02015a36140\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:38:59.564862 env[1220]: time="2025-05-08T00:38:59.564807435Z" level=info msg="CreateContainer within sandbox \"4559202dfd539a398fd5ec66ab74078e9692d191d30d39661a07e02015a36140\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f3de7f0f1c719eaa8429aa82bc5b9c702b8edb8c17e51fd287d641c82dc935a3\"" May 8 00:38:59.565546 env[1220]: time="2025-05-08T00:38:59.565497156Z" level=info msg="StartContainer for \"f3de7f0f1c719eaa8429aa82bc5b9c702b8edb8c17e51fd287d641c82dc935a3\"" May 8 00:38:59.592061 systemd[1]: Started cri-containerd-f3de7f0f1c719eaa8429aa82bc5b9c702b8edb8c17e51fd287d641c82dc935a3.scope. May 8 00:38:59.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.622000 audit: BPF prog-id=126 op=LOAD May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2360 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:59.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646537663066316337313965616138343239616138326263356239 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2360 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:59.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646537663066316337313965616138343239616138326263356239 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit: BPF prog-id=127 op=LOAD May 8 00:38:59.623000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2360 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:59.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646537663066316337313965616138343239616138326263356239 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit: BPF prog-id=128 op=LOAD May 8 00:38:59.623000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2360 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:59.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646537663066316337313965616138343239616138326263356239 May 8 00:38:59.623000 audit: BPF prog-id=128 op=UNLOAD May 8 00:38:59.623000 audit: BPF prog-id=127 op=UNLOAD May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:38:59.623000 audit: BPF prog-id=129 op=LOAD May 8 00:38:59.623000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2360 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:38:59.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646537663066316337313965616138343239616138326263356239 May 8 00:38:59.651287 env[1220]: time="2025-05-08T00:38:59.651227015Z" level=info msg="StartContainer for \"f3de7f0f1c719eaa8429aa82bc5b9c702b8edb8c17e51fd287d641c82dc935a3\" returns successfully" May 8 00:38:59.949780 kubelet[1954]: E0508 00:38:59.949733 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:38:59.992249 kubelet[1954]: E0508 00:38:59.992206 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.992249 kubelet[1954]: W0508 00:38:59.992238 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.992449 kubelet[1954]: E0508 00:38:59.992262 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.992502 kubelet[1954]: E0508 00:38:59.992485 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.994177 kubelet[1954]: W0508 00:38:59.992498 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.994235 kubelet[1954]: E0508 00:38:59.994201 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.994461 kubelet[1954]: E0508 00:38:59.994450 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.994495 kubelet[1954]: W0508 00:38:59.994462 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.994495 kubelet[1954]: E0508 00:38:59.994473 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.994677 kubelet[1954]: E0508 00:38:59.994664 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.994677 kubelet[1954]: W0508 00:38:59.994675 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.994740 kubelet[1954]: E0508 00:38:59.994686 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.994875 kubelet[1954]: E0508 00:38:59.994863 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.994875 kubelet[1954]: W0508 00:38:59.994874 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.994927 kubelet[1954]: E0508 00:38:59.994891 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995054 kubelet[1954]: E0508 00:38:59.995044 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995081 kubelet[1954]: W0508 00:38:59.995054 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995081 kubelet[1954]: E0508 00:38:59.995062 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995234 kubelet[1954]: E0508 00:38:59.995224 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995234 kubelet[1954]: W0508 00:38:59.995234 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995292 kubelet[1954]: E0508 00:38:59.995242 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995405 kubelet[1954]: E0508 00:38:59.995394 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995405 kubelet[1954]: W0508 00:38:59.995404 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995462 kubelet[1954]: E0508 00:38:59.995412 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995563 kubelet[1954]: E0508 00:38:59.995554 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995589 kubelet[1954]: W0508 00:38:59.995563 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995589 kubelet[1954]: E0508 00:38:59.995572 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995797 kubelet[1954]: E0508 00:38:59.995787 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995797 kubelet[1954]: W0508 00:38:59.995796 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995848 kubelet[1954]: E0508 00:38:59.995804 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.995930 kubelet[1954]: E0508 00:38:59.995921 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.995958 kubelet[1954]: W0508 00:38:59.995930 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.995958 kubelet[1954]: E0508 00:38:59.995946 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.996079 kubelet[1954]: E0508 00:38:59.996070 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.996102 kubelet[1954]: W0508 00:38:59.996079 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.996102 kubelet[1954]: E0508 00:38:59.996086 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.996216 kubelet[1954]: E0508 00:38:59.996208 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.996240 kubelet[1954]: W0508 00:38:59.996217 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.996240 kubelet[1954]: E0508 00:38:59.996226 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.996361 kubelet[1954]: E0508 00:38:59.996353 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.996396 kubelet[1954]: W0508 00:38:59.996368 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.996396 kubelet[1954]: E0508 00:38:59.996378 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:38:59.996521 kubelet[1954]: E0508 00:38:59.996511 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:38:59.996548 kubelet[1954]: W0508 00:38:59.996521 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:38:59.996548 kubelet[1954]: E0508 00:38:59.996529 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.018043 kubelet[1954]: E0508 00:39:00.018019 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.018043 kubelet[1954]: W0508 00:39:00.018037 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.018209 kubelet[1954]: E0508 00:39:00.018053 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.018284 kubelet[1954]: E0508 00:39:00.018274 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.018318 kubelet[1954]: W0508 00:39:00.018286 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.018318 kubelet[1954]: E0508 00:39:00.018302 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.018519 kubelet[1954]: E0508 00:39:00.018504 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.018519 kubelet[1954]: W0508 00:39:00.018515 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.018658 kubelet[1954]: E0508 00:39:00.018527 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.018768 kubelet[1954]: E0508 00:39:00.018756 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.018768 kubelet[1954]: W0508 00:39:00.018767 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.018826 kubelet[1954]: E0508 00:39:00.018780 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.018952 kubelet[1954]: E0508 00:39:00.018942 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.018996 kubelet[1954]: W0508 00:39:00.018951 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.018996 kubelet[1954]: E0508 00:39:00.018963 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019110 kubelet[1954]: E0508 00:39:00.019091 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019110 kubelet[1954]: W0508 00:39:00.019100 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019110 kubelet[1954]: E0508 00:39:00.019108 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019269 kubelet[1954]: E0508 00:39:00.019259 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019269 kubelet[1954]: W0508 00:39:00.019268 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019346 kubelet[1954]: E0508 00:39:00.019294 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019440 kubelet[1954]: E0508 00:39:00.019432 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019440 kubelet[1954]: W0508 00:39:00.019440 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019551 kubelet[1954]: E0508 00:39:00.019515 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019602 kubelet[1954]: E0508 00:39:00.019572 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019602 kubelet[1954]: W0508 00:39:00.019578 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019602 kubelet[1954]: E0508 00:39:00.019589 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019804 kubelet[1954]: E0508 00:39:00.019796 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019845 kubelet[1954]: W0508 00:39:00.019805 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019845 kubelet[1954]: E0508 00:39:00.019815 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.019970 kubelet[1954]: E0508 00:39:00.019951 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.019970 kubelet[1954]: W0508 00:39:00.019959 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.019970 kubelet[1954]: E0508 00:39:00.019969 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.020127 kubelet[1954]: E0508 00:39:00.020118 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.020165 kubelet[1954]: W0508 00:39:00.020128 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.020165 kubelet[1954]: E0508 00:39:00.020139 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.020487 kubelet[1954]: E0508 00:39:00.020378 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.020487 kubelet[1954]: W0508 00:39:00.020391 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.020487 kubelet[1954]: E0508 00:39:00.020406 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.020768 kubelet[1954]: E0508 00:39:00.020662 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.020768 kubelet[1954]: W0508 00:39:00.020676 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.020768 kubelet[1954]: E0508 00:39:00.020691 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.021028 kubelet[1954]: E0508 00:39:00.020904 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.021028 kubelet[1954]: W0508 00:39:00.020916 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.021028 kubelet[1954]: E0508 00:39:00.020931 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.021370 kubelet[1954]: E0508 00:39:00.021191 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.021370 kubelet[1954]: W0508 00:39:00.021203 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.021370 kubelet[1954]: E0508 00:39:00.021217 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.021482 kubelet[1954]: E0508 00:39:00.021429 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.021482 kubelet[1954]: W0508 00:39:00.021439 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.021482 kubelet[1954]: E0508 00:39:00.021454 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.021648 kubelet[1954]: E0508 00:39:00.021637 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:39:00.021648 kubelet[1954]: W0508 00:39:00.021647 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:39:00.021712 kubelet[1954]: E0508 00:39:00.021655 1954 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:39:00.628989 env[1220]: time="2025-05-08T00:39:00.628934706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:00.630155 env[1220]: time="2025-05-08T00:39:00.630122587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:00.632286 env[1220]: time="2025-05-08T00:39:00.632253229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:00.634041 env[1220]: time="2025-05-08T00:39:00.634011231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:00.634283 env[1220]: time="2025-05-08T00:39:00.634258552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 8 00:39:00.636572 env[1220]: time="2025-05-08T00:39:00.636541994Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:39:00.649942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1990190159.mount: Deactivated successfully. May 8 00:39:00.653427 env[1220]: time="2025-05-08T00:39:00.653376732Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f\"" May 8 00:39:00.654104 env[1220]: time="2025-05-08T00:39:00.654078453Z" level=info msg="StartContainer for \"782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f\"" May 8 00:39:00.680384 systemd[1]: Started cri-containerd-782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f.scope. May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2427 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:00.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323135306339383937643336313437323531343561326231646266 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit: BPF prog-id=130 op=LOAD May 8 00:39:00.711000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2427 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:00.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323135306339383937643336313437323531343561326231646266 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit: BPF prog-id=131 op=LOAD May 8 00:39:00.711000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2427 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:00.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323135306339383937643336313437323531343561326231646266 May 8 00:39:00.711000 audit: BPF prog-id=131 op=UNLOAD May 8 00:39:00.711000 audit: BPF prog-id=130 op=UNLOAD May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:00.711000 audit: BPF prog-id=132 op=LOAD May 8 00:39:00.711000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2427 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:00.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323135306339383937643336313437323531343561326231646266 May 8 00:39:00.727223 env[1220]: time="2025-05-08T00:39:00.727168053Z" level=info msg="StartContainer for \"782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f\" returns successfully" May 8 00:39:00.742795 systemd[1]: cri-containerd-782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f.scope: Deactivated successfully. May 8 00:39:00.748000 audit: BPF prog-id=132 op=UNLOAD May 8 00:39:00.763778 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f-rootfs.mount: Deactivated successfully. May 8 00:39:00.838314 env[1220]: time="2025-05-08T00:39:00.838267974Z" level=info msg="shim disconnected" id=782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f May 8 00:39:00.838559 env[1220]: time="2025-05-08T00:39:00.838540654Z" level=warning msg="cleaning up after shim disconnected" id=782150c9897d3614725145a2b1dbfe3807c6b4b49cd888d7f00088e3d2327e5f namespace=k8s.io May 8 00:39:00.838642 env[1220]: time="2025-05-08T00:39:00.838627694Z" level=info msg="cleaning up dead shim" May 8 00:39:00.845498 env[1220]: time="2025-05-08T00:39:00.845454862Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:39:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2584 runtime=io.containerd.runc.v2\n" May 8 00:39:00.901194 kubelet[1954]: E0508 00:39:00.901160 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:39:00.953282 kubelet[1954]: E0508 00:39:00.953252 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:00.954513 kubelet[1954]: I0508 00:39:00.954471 1954 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:39:00.954646 env[1220]: time="2025-05-08T00:39:00.954494140Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:39:00.956113 kubelet[1954]: E0508 00:39:00.955968 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:00.968886 kubelet[1954]: I0508 00:39:00.968701 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6bb7796c84-jjrvw" podStartSLOduration=2.275098006 podStartE2EDuration="3.968682436s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:38:57.846142576 +0000 UTC m=+14.030410599" lastFinishedPulling="2025-05-08 00:38:59.539727046 +0000 UTC m=+15.723995029" observedRunningTime="2025-05-08 00:38:59.960841615 +0000 UTC m=+16.145109638" watchObservedRunningTime="2025-05-08 00:39:00.968682436 +0000 UTC m=+17.152950459" May 8 00:39:02.901877 kubelet[1954]: E0508 00:39:02.901826 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:39:04.423638 env[1220]: time="2025-05-08T00:39:04.423268703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:04.424825 env[1220]: time="2025-05-08T00:39:04.424789704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:04.426246 env[1220]: time="2025-05-08T00:39:04.426204705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:04.427964 env[1220]: time="2025-05-08T00:39:04.427934747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:04.428446 env[1220]: time="2025-05-08T00:39:04.428412547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 8 00:39:04.432680 env[1220]: time="2025-05-08T00:39:04.432646191Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:39:04.444058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307082253.mount: Deactivated successfully. May 8 00:39:04.448766 env[1220]: time="2025-05-08T00:39:04.448703284Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a\"" May 8 00:39:04.449643 env[1220]: time="2025-05-08T00:39:04.449613205Z" level=info msg="StartContainer for \"7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a\"" May 8 00:39:04.469642 systemd[1]: Started cri-containerd-7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a.scope. May 8 00:39:04.503634 kernel: kauditd_printk_skb: 223 callbacks suppressed May 8 00:39:04.528075 kernel: audit: type=1400 audit(1746664744.500:994): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528187 kernel: audit: type=1300 audit(1746664744.500:994): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2427 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:04.528221 kernel: audit: type=1327 audit(1746664744.500:994): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353033383263616230633864623830643665616466373733653333 May 8 00:39:04.528244 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528266 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528288 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528307 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528324 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.528340 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.500000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.500000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2427 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:04.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353033383263616230633864623830643665616466373733653333 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.535424 kernel: audit: type=1400 audit(1746664744.501:995): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.501000 audit: BPF prog-id=133 op=LOAD May 8 00:39:04.501000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2427 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:04.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353033383263616230633864623830643665616466373733653333 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.503000 audit: BPF prog-id=134 op=LOAD May 8 00:39:04.503000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2427 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:04.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353033383263616230633864623830643665616466373733653333 May 8 00:39:04.507000 audit: BPF prog-id=134 op=UNLOAD May 8 00:39:04.507000 audit: BPF prog-id=133 op=UNLOAD May 8 00:39:04.507000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:04.507000 audit: BPF prog-id=135 op=LOAD May 8 00:39:04.507000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2427 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:04.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353033383263616230633864623830643665616466373733653333 May 8 00:39:04.595116 env[1220]: time="2025-05-08T00:39:04.595063847Z" level=info msg="StartContainer for \"7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a\" returns successfully" May 8 00:39:04.902146 kubelet[1954]: E0508 00:39:04.902093 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:39:04.963385 kubelet[1954]: E0508 00:39:04.963339 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:05.138609 env[1220]: time="2025-05-08T00:39:05.138547257Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:39:05.140678 systemd[1]: cri-containerd-7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a.scope: Deactivated successfully. May 8 00:39:05.144000 audit: BPF prog-id=135 op=UNLOAD May 8 00:39:05.161764 env[1220]: time="2025-05-08T00:39:05.161662316Z" level=info msg="shim disconnected" id=7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a May 8 00:39:05.161764 env[1220]: time="2025-05-08T00:39:05.161706516Z" level=warning msg="cleaning up after shim disconnected" id=7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a namespace=k8s.io May 8 00:39:05.161764 env[1220]: time="2025-05-08T00:39:05.161722596Z" level=info msg="cleaning up dead shim" May 8 00:39:05.168540 env[1220]: time="2025-05-08T00:39:05.168500641Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:39:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2651 runtime=io.containerd.runc.v2\n" May 8 00:39:05.230448 kubelet[1954]: I0508 00:39:05.229912 1954 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 8 00:39:05.267181 systemd[1]: Created slice kubepods-burstable-podbeed0031_63b3_43c1_a16a_bff4ae2fb2f9.slice. May 8 00:39:05.272161 systemd[1]: Created slice kubepods-besteffort-pod67da260b_a9cf_4fc5_a3e9_4921c1fb24d8.slice. May 8 00:39:05.277857 systemd[1]: Created slice kubepods-burstable-pod0879df54_64ba_4699_9a0f_25d5ec902580.slice. May 8 00:39:05.283712 systemd[1]: Created slice kubepods-besteffort-poddf47b00b_4cf5_4427_b2b6_3e05198eeb27.slice. May 8 00:39:05.291202 systemd[1]: Created slice kubepods-besteffort-podd63149e1_4d91_4b94_acb3_5421d218b97f.slice. May 8 00:39:05.358000 kubelet[1954]: I0508 00:39:05.357941 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/df47b00b-4cf5-4427-b2b6-3e05198eeb27-calico-apiserver-certs\") pod \"calico-apiserver-674b4d589-ql6mv\" (UID: \"df47b00b-4cf5-4427-b2b6-3e05198eeb27\") " pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" May 8 00:39:05.358000 kubelet[1954]: I0508 00:39:05.357998 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v4tq5\" (UniqueName: \"kubernetes.io/projected/d63149e1-4d91-4b94-acb3-5421d218b97f-kube-api-access-v4tq5\") pod \"calico-apiserver-674b4d589-9lffc\" (UID: \"d63149e1-4d91-4b94-acb3-5421d218b97f\") " pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" May 8 00:39:05.358180 kubelet[1954]: I0508 00:39:05.358027 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6mxh7\" (UniqueName: \"kubernetes.io/projected/beed0031-63b3-43c1-a16a-bff4ae2fb2f9-kube-api-access-6mxh7\") pod \"coredns-668d6bf9bc-t66vb\" (UID: \"beed0031-63b3-43c1-a16a-bff4ae2fb2f9\") " pod="kube-system/coredns-668d6bf9bc-t66vb" May 8 00:39:05.358180 kubelet[1954]: I0508 00:39:05.358085 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d63149e1-4d91-4b94-acb3-5421d218b97f-calico-apiserver-certs\") pod \"calico-apiserver-674b4d589-9lffc\" (UID: \"d63149e1-4d91-4b94-acb3-5421d218b97f\") " pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" May 8 00:39:05.358180 kubelet[1954]: I0508 00:39:05.358155 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0879df54-64ba-4699-9a0f-25d5ec902580-config-volume\") pod \"coredns-668d6bf9bc-6wnc5\" (UID: \"0879df54-64ba-4699-9a0f-25d5ec902580\") " pod="kube-system/coredns-668d6bf9bc-6wnc5" May 8 00:39:05.358259 kubelet[1954]: I0508 00:39:05.358180 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jblmq\" (UniqueName: \"kubernetes.io/projected/67da260b-a9cf-4fc5-a3e9-4921c1fb24d8-kube-api-access-jblmq\") pod \"calico-kube-controllers-59c8886cdc-h62qq\" (UID: \"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8\") " pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" May 8 00:39:05.358259 kubelet[1954]: I0508 00:39:05.358199 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/beed0031-63b3-43c1-a16a-bff4ae2fb2f9-config-volume\") pod \"coredns-668d6bf9bc-t66vb\" (UID: \"beed0031-63b3-43c1-a16a-bff4ae2fb2f9\") " pod="kube-system/coredns-668d6bf9bc-t66vb" May 8 00:39:05.358259 kubelet[1954]: I0508 00:39:05.358216 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mfz86\" (UniqueName: \"kubernetes.io/projected/0879df54-64ba-4699-9a0f-25d5ec902580-kube-api-access-mfz86\") pod \"coredns-668d6bf9bc-6wnc5\" (UID: \"0879df54-64ba-4699-9a0f-25d5ec902580\") " pod="kube-system/coredns-668d6bf9bc-6wnc5" May 8 00:39:05.358259 kubelet[1954]: I0508 00:39:05.358231 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8tbjb\" (UniqueName: \"kubernetes.io/projected/df47b00b-4cf5-4427-b2b6-3e05198eeb27-kube-api-access-8tbjb\") pod \"calico-apiserver-674b4d589-ql6mv\" (UID: \"df47b00b-4cf5-4427-b2b6-3e05198eeb27\") " pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" May 8 00:39:05.358259 kubelet[1954]: I0508 00:39:05.358247 1954 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67da260b-a9cf-4fc5-a3e9-4921c1fb24d8-tigera-ca-bundle\") pod \"calico-kube-controllers-59c8886cdc-h62qq\" (UID: \"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8\") " pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" May 8 00:39:05.441268 systemd[1]: run-containerd-runc-k8s.io-7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a-runc.YEiTD6.mount: Deactivated successfully. May 8 00:39:05.441371 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7c50382cab0c8db80d6eadf773e335b9f2c9758da03ee26785c7cf8c3f73c61a-rootfs.mount: Deactivated successfully. May 8 00:39:05.571077 kubelet[1954]: E0508 00:39:05.571028 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:05.572193 env[1220]: time="2025-05-08T00:39:05.571811559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-t66vb,Uid:beed0031-63b3-43c1-a16a-bff4ae2fb2f9,Namespace:kube-system,Attempt:0,}" May 8 00:39:05.576364 env[1220]: time="2025-05-08T00:39:05.576316483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59c8886cdc-h62qq,Uid:67da260b-a9cf-4fc5-a3e9-4921c1fb24d8,Namespace:calico-system,Attempt:0,}" May 8 00:39:05.581655 kubelet[1954]: E0508 00:39:05.581623 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:05.583254 env[1220]: time="2025-05-08T00:39:05.582988128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wnc5,Uid:0879df54-64ba-4699-9a0f-25d5ec902580,Namespace:kube-system,Attempt:0,}" May 8 00:39:05.588361 env[1220]: time="2025-05-08T00:39:05.588304532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-ql6mv,Uid:df47b00b-4cf5-4427-b2b6-3e05198eeb27,Namespace:calico-apiserver,Attempt:0,}" May 8 00:39:05.595292 env[1220]: time="2025-05-08T00:39:05.595236298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-9lffc,Uid:d63149e1-4d91-4b94-acb3-5421d218b97f,Namespace:calico-apiserver,Attempt:0,}" May 8 00:39:05.945900 env[1220]: time="2025-05-08T00:39:05.945821774Z" level=error msg="Failed to destroy network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.946242 env[1220]: time="2025-05-08T00:39:05.946208695Z" level=error msg="encountered an error cleaning up failed sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.946319 env[1220]: time="2025-05-08T00:39:05.946242295Z" level=error msg="Failed to destroy network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.946399 env[1220]: time="2025-05-08T00:39:05.946262335Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wnc5,Uid:0879df54-64ba-4699-9a0f-25d5ec902580,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.946806 kubelet[1954]: E0508 00:39:05.946683 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.947621 env[1220]: time="2025-05-08T00:39:05.947088175Z" level=error msg="encountered an error cleaning up failed sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.947621 env[1220]: time="2025-05-08T00:39:05.947264375Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-t66vb,Uid:beed0031-63b3-43c1-a16a-bff4ae2fb2f9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.948462 kubelet[1954]: E0508 00:39:05.948299 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6wnc5" May 8 00:39:05.948462 kubelet[1954]: E0508 00:39:05.948350 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6wnc5" May 8 00:39:05.948462 kubelet[1954]: E0508 00:39:05.948420 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6wnc5_kube-system(0879df54-64ba-4699-9a0f-25d5ec902580)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6wnc5_kube-system(0879df54-64ba-4699-9a0f-25d5ec902580)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6wnc5" podUID="0879df54-64ba-4699-9a0f-25d5ec902580" May 8 00:39:05.950350 kubelet[1954]: E0508 00:39:05.950213 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.950350 kubelet[1954]: E0508 00:39:05.950252 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-t66vb" May 8 00:39:05.950350 kubelet[1954]: E0508 00:39:05.950269 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-t66vb" May 8 00:39:05.950489 kubelet[1954]: E0508 00:39:05.950300 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-t66vb_kube-system(beed0031-63b3-43c1-a16a-bff4ae2fb2f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-t66vb_kube-system(beed0031-63b3-43c1-a16a-bff4ae2fb2f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-t66vb" podUID="beed0031-63b3-43c1-a16a-bff4ae2fb2f9" May 8 00:39:05.951046 env[1220]: time="2025-05-08T00:39:05.951003178Z" level=error msg="Failed to destroy network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.951368 env[1220]: time="2025-05-08T00:39:05.951326979Z" level=error msg="encountered an error cleaning up failed sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.951410 env[1220]: time="2025-05-08T00:39:05.951385219Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-ql6mv,Uid:df47b00b-4cf5-4427-b2b6-3e05198eeb27,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.951831 kubelet[1954]: E0508 00:39:05.951713 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.951831 kubelet[1954]: E0508 00:39:05.951747 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" May 8 00:39:05.951831 kubelet[1954]: E0508 00:39:05.951762 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" May 8 00:39:05.951968 kubelet[1954]: E0508 00:39:05.951790 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-674b4d589-ql6mv_calico-apiserver(df47b00b-4cf5-4427-b2b6-3e05198eeb27)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-674b4d589-ql6mv_calico-apiserver(df47b00b-4cf5-4427-b2b6-3e05198eeb27)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" podUID="df47b00b-4cf5-4427-b2b6-3e05198eeb27" May 8 00:39:05.954096 env[1220]: time="2025-05-08T00:39:05.954046261Z" level=error msg="Failed to destroy network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.954464 env[1220]: time="2025-05-08T00:39:05.954424661Z" level=error msg="encountered an error cleaning up failed sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.954562 env[1220]: time="2025-05-08T00:39:05.954475781Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-9lffc,Uid:d63149e1-4d91-4b94-acb3-5421d218b97f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.954877 kubelet[1954]: E0508 00:39:05.954704 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.954877 kubelet[1954]: E0508 00:39:05.954742 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" May 8 00:39:05.954877 kubelet[1954]: E0508 00:39:05.954758 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" May 8 00:39:05.955089 kubelet[1954]: E0508 00:39:05.954786 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-674b4d589-9lffc_calico-apiserver(d63149e1-4d91-4b94-acb3-5421d218b97f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-674b4d589-9lffc_calico-apiserver(d63149e1-4d91-4b94-acb3-5421d218b97f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" podUID="d63149e1-4d91-4b94-acb3-5421d218b97f" May 8 00:39:05.963567 env[1220]: time="2025-05-08T00:39:05.963528228Z" level=error msg="Failed to destroy network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.963877 env[1220]: time="2025-05-08T00:39:05.963847228Z" level=error msg="encountered an error cleaning up failed sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.963920 kubelet[1954]: I0508 00:39:05.963857 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:05.963954 env[1220]: time="2025-05-08T00:39:05.963891188Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59c8886cdc-h62qq,Uid:67da260b-a9cf-4fc5-a3e9-4921c1fb24d8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.964538 kubelet[1954]: E0508 00:39:05.964490 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:05.964538 kubelet[1954]: E0508 00:39:05.964531 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" May 8 00:39:05.964625 kubelet[1954]: E0508 00:39:05.964548 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" May 8 00:39:05.964625 kubelet[1954]: E0508 00:39:05.964575 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-59c8886cdc-h62qq_calico-system(67da260b-a9cf-4fc5-a3e9-4921c1fb24d8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-59c8886cdc-h62qq_calico-system(67da260b-a9cf-4fc5-a3e9-4921c1fb24d8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" podUID="67da260b-a9cf-4fc5-a3e9-4921c1fb24d8" May 8 00:39:05.964745 env[1220]: time="2025-05-08T00:39:05.964571749Z" level=info msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" May 8 00:39:05.965553 kubelet[1954]: I0508 00:39:05.965519 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:05.966529 env[1220]: time="2025-05-08T00:39:05.966486351Z" level=info msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" May 8 00:39:05.968239 kubelet[1954]: I0508 00:39:05.968205 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:05.968763 env[1220]: time="2025-05-08T00:39:05.968729152Z" level=info msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" May 8 00:39:05.974128 kubelet[1954]: E0508 00:39:05.973948 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:05.976361 env[1220]: time="2025-05-08T00:39:05.976097958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:39:05.979754 kubelet[1954]: I0508 00:39:05.979732 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:05.980465 env[1220]: time="2025-05-08T00:39:05.980416842Z" level=info msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" May 8 00:39:06.001958 env[1220]: time="2025-05-08T00:39:06.001900778Z" level=error msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" failed" error="failed to destroy network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.002206 kubelet[1954]: E0508 00:39:06.002154 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:06.002296 kubelet[1954]: E0508 00:39:06.002233 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a"} May 8 00:39:06.002332 kubelet[1954]: E0508 00:39:06.002311 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"beed0031-63b3-43c1-a16a-bff4ae2fb2f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:06.002409 kubelet[1954]: E0508 00:39:06.002333 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"beed0031-63b3-43c1-a16a-bff4ae2fb2f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-t66vb" podUID="beed0031-63b3-43c1-a16a-bff4ae2fb2f9" May 8 00:39:06.008553 env[1220]: time="2025-05-08T00:39:06.008493263Z" level=error msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" failed" error="failed to destroy network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.008859 kubelet[1954]: E0508 00:39:06.008825 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:06.008914 kubelet[1954]: E0508 00:39:06.008873 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408"} May 8 00:39:06.008948 kubelet[1954]: E0508 00:39:06.008915 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0879df54-64ba-4699-9a0f-25d5ec902580\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:06.008948 kubelet[1954]: E0508 00:39:06.008936 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0879df54-64ba-4699-9a0f-25d5ec902580\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6wnc5" podUID="0879df54-64ba-4699-9a0f-25d5ec902580" May 8 00:39:06.010210 env[1220]: time="2025-05-08T00:39:06.010166905Z" level=error msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" failed" error="failed to destroy network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.010505 kubelet[1954]: E0508 00:39:06.010449 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:06.010505 kubelet[1954]: E0508 00:39:06.010496 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f"} May 8 00:39:06.010612 kubelet[1954]: E0508 00:39:06.010533 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"df47b00b-4cf5-4427-b2b6-3e05198eeb27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:06.010612 kubelet[1954]: E0508 00:39:06.010563 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"df47b00b-4cf5-4427-b2b6-3e05198eeb27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" podUID="df47b00b-4cf5-4427-b2b6-3e05198eeb27" May 8 00:39:06.027259 env[1220]: time="2025-05-08T00:39:06.027200597Z" level=error msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" failed" error="failed to destroy network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.027455 kubelet[1954]: E0508 00:39:06.027421 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:06.027548 kubelet[1954]: E0508 00:39:06.027464 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02"} May 8 00:39:06.027548 kubelet[1954]: E0508 00:39:06.027506 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d63149e1-4d91-4b94-acb3-5421d218b97f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:06.027683 kubelet[1954]: E0508 00:39:06.027540 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d63149e1-4d91-4b94-acb3-5421d218b97f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" podUID="d63149e1-4d91-4b94-acb3-5421d218b97f" May 8 00:39:06.905946 systemd[1]: Created slice kubepods-besteffort-podd3d376fe_5d96_47d8_8530_176f83a0cb2e.slice. May 8 00:39:06.908122 env[1220]: time="2025-05-08T00:39:06.908085409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl96g,Uid:d3d376fe-5d96-47d8-8530-176f83a0cb2e,Namespace:calico-system,Attempt:0,}" May 8 00:39:06.983036 kubelet[1954]: I0508 00:39:06.982799 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:06.984572 env[1220]: time="2025-05-08T00:39:06.984532705Z" level=info msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" May 8 00:39:06.994155 env[1220]: time="2025-05-08T00:39:06.994100112Z" level=error msg="Failed to destroy network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.996076 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600-shm.mount: Deactivated successfully. May 8 00:39:06.998512 env[1220]: time="2025-05-08T00:39:06.998465155Z" level=error msg="encountered an error cleaning up failed sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.998619 env[1220]: time="2025-05-08T00:39:06.998530356Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl96g,Uid:d3d376fe-5d96-47d8-8530-176f83a0cb2e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.998784 kubelet[1954]: E0508 00:39:06.998749 1954 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:06.998835 kubelet[1954]: E0508 00:39:06.998808 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zl96g" May 8 00:39:06.998869 kubelet[1954]: E0508 00:39:06.998831 1954 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zl96g" May 8 00:39:06.998894 kubelet[1954]: E0508 00:39:06.998867 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zl96g_calico-system(d3d376fe-5d96-47d8-8530-176f83a0cb2e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zl96g_calico-system(d3d376fe-5d96-47d8-8530-176f83a0cb2e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:39:07.024288 env[1220]: time="2025-05-08T00:39:07.024228773Z" level=error msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" failed" error="failed to destroy network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:07.024780 kubelet[1954]: E0508 00:39:07.024738 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:07.024879 kubelet[1954]: E0508 00:39:07.024791 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5"} May 8 00:39:07.024879 kubelet[1954]: E0508 00:39:07.024823 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:07.024879 kubelet[1954]: E0508 00:39:07.024848 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" podUID="67da260b-a9cf-4fc5-a3e9-4921c1fb24d8" May 8 00:39:07.985296 kubelet[1954]: I0508 00:39:07.985263 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:07.986004 env[1220]: time="2025-05-08T00:39:07.985967600Z" level=info msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" May 8 00:39:08.014824 env[1220]: time="2025-05-08T00:39:08.014749100Z" level=error msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" failed" error="failed to destroy network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:39:08.015079 kubelet[1954]: E0508 00:39:08.015021 1954 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:08.015137 kubelet[1954]: E0508 00:39:08.015082 1954 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600"} May 8 00:39:08.015137 kubelet[1954]: E0508 00:39:08.015121 1954 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:39:08.015215 kubelet[1954]: E0508 00:39:08.015143 1954 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3d376fe-5d96-47d8-8530-176f83a0cb2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zl96g" podUID="d3d376fe-5d96-47d8-8530-176f83a0cb2e" May 8 00:39:10.912125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3711357881.mount: Deactivated successfully. May 8 00:39:11.152958 env[1220]: time="2025-05-08T00:39:11.152907443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:11.154579 env[1220]: time="2025-05-08T00:39:11.154547764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:11.156235 env[1220]: time="2025-05-08T00:39:11.156204525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:11.157459 env[1220]: time="2025-05-08T00:39:11.157422125Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:11.157914 env[1220]: time="2025-05-08T00:39:11.157888245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 8 00:39:11.172105 env[1220]: time="2025-05-08T00:39:11.171844533Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:39:11.188671 env[1220]: time="2025-05-08T00:39:11.188635822Z" level=info msg="CreateContainer within sandbox \"60513b9498b3f2429ef961897ce61e95d7da4cc9e4477c8ffc705773c7ab8a66\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6\"" May 8 00:39:11.190492 env[1220]: time="2025-05-08T00:39:11.190463943Z" level=info msg="StartContainer for \"e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6\"" May 8 00:39:11.207108 systemd[1]: Started cri-containerd-e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6.scope. May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.271624 kernel: kauditd_printk_skb: 34 callbacks suppressed May 8 00:39:11.271698 kernel: audit: type=1400 audit(1746664751.267:1001): avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.271727 kernel: audit: type=1300 audit(1746664751.267:1001): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2427 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.267000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2427 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538346565336235626266643461643632326637316461623330346531 May 8 00:39:11.278212 kernel: audit: type=1327 audit(1746664751.267:1001): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538346565336235626266643461643632326637316461623330346531 May 8 00:39:11.278292 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.282858 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.282902 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.287730 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.287794 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.289541 env[1220]: time="2025-05-08T00:39:11.289488956Z" level=info msg="StartContainer for \"e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6\" returns successfully" May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.294074 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.296951 kernel: audit: type=1400 audit(1746664751.267:1002): avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit: BPF prog-id=136 op=LOAD May 8 00:39:11.267000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2427 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538346565336235626266643461643632326637316461623330346531 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit: BPF prog-id=137 op=LOAD May 8 00:39:11.267000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2427 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538346565336235626266643461643632326637316461623330346531 May 8 00:39:11.267000 audit: BPF prog-id=137 op=UNLOAD May 8 00:39:11.267000 audit: BPF prog-id=136 op=UNLOAD May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:11.267000 audit: BPF prog-id=138 op=LOAD May 8 00:39:11.267000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2427 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:11.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538346565336235626266643461643632326637316461623330346531 May 8 00:39:11.441038 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:39:11.441140 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:39:11.994804 kubelet[1954]: E0508 00:39:11.994400 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:12.016880 systemd[1]: run-containerd-runc-k8s.io-e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6-runc.5LN1sB.mount: Deactivated successfully. May 8 00:39:12.194390 systemd[1]: Started sshd@7-10.0.0.58:22-10.0.0.1:48260.service. May 8 00:39:12.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.58:22-10.0.0.1:48260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.240000 audit[3129]: USER_ACCT pid=3129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.240957 sshd[3129]: Accepted publickey for core from 10.0.0.1 port 48260 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:12.241000 audit[3129]: CRED_ACQ pid=3129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.241000 audit[3129]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9c01970 a2=3 a3=1 items=0 ppid=1 pid=3129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:12.242617 sshd[3129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:12.246461 systemd-logind[1212]: New session 8 of user core. May 8 00:39:12.246912 systemd[1]: Started session-8.scope. May 8 00:39:12.250000 audit[3129]: USER_START pid=3129 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.251000 audit[3131]: CRED_ACQ pid=3131 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.400771 sshd[3129]: pam_unix(sshd:session): session closed for user core May 8 00:39:12.401000 audit[3129]: USER_END pid=3129 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.401000 audit[3129]: CRED_DISP pid=3129 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:12.403585 systemd[1]: sshd@7-10.0.0.58:22-10.0.0.1:48260.service: Deactivated successfully. May 8 00:39:12.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.58:22-10.0.0.1:48260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:12.404426 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:39:12.404927 systemd-logind[1212]: Session 8 logged out. Waiting for processes to exit. May 8 00:39:12.405652 systemd-logind[1212]: Removed session 8. May 8 00:39:12.690000 audit[3205]: AVC avc: denied { write } for pid=3205 comm="tee" name="fd" dev="proc" ino=19539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.690000 audit[3205]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa935a2a a2=241 a3=1b6 items=1 ppid=3154 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.690000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:39:12.690000 audit: PATH item=0 name="/dev/fd/63" inode=17371 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.690000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.706000 audit[3208]: AVC avc: denied { write } for pid=3208 comm="tee" name="fd" dev="proc" ino=19548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.706000 audit[3208]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc29e4a1a a2=241 a3=1b6 items=1 ppid=3150 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.706000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:39:12.706000 audit: PATH item=0 name="/dev/fd/63" inode=17372 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.706000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.716000 audit[3213]: AVC avc: denied { write } for pid=3213 comm="tee" name="fd" dev="proc" ino=17380 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.716000 audit[3213]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedd46a1b a2=241 a3=1b6 items=1 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.716000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:39:12.716000 audit: PATH item=0 name="/dev/fd/63" inode=19545 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.716000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.717000 audit[3229]: AVC avc: denied { write } for pid=3229 comm="tee" name="fd" dev="proc" ino=19557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.717000 audit[3229]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd252a2a a2=241 a3=1b6 items=1 ppid=3159 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.717000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:39:12.717000 audit: PATH item=0 name="/dev/fd/63" inode=18354 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.717000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.720000 audit[3219]: AVC avc: denied { write } for pid=3219 comm="tee" name="fd" dev="proc" ino=18357 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.720000 audit[3219]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcae5ea2b a2=241 a3=1b6 items=1 ppid=3160 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.720000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:39:12.720000 audit: PATH item=0 name="/dev/fd/63" inode=18858 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.724000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=18861 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.724000 audit[3226]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd34a4a2a a2=241 a3=1b6 items=1 ppid=3155 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.724000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:39:12.724000 audit: PATH item=0 name="/dev/fd/63" inode=19552 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.732000 audit[3236]: AVC avc: denied { write } for pid=3236 comm="tee" name="fd" dev="proc" ino=18361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:39:12.732000 audit[3236]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd569da2c a2=241 a3=1b6 items=1 ppid=3151 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:12.732000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:39:12.732000 audit: PATH item=0 name="/dev/fd/63" inode=18868 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:39:12.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:39:12.999376 kubelet[1954]: E0508 00:39:12.996236 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:13.997723 kubelet[1954]: E0508 00:39:13.997641 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:16.904508 env[1220]: time="2025-05-08T00:39:16.903103155Z" level=info msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" May 8 00:39:16.997504 kubelet[1954]: I0508 00:39:16.997109 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bs55k" podStartSLOduration=6.753160611 podStartE2EDuration="19.997090031s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:38:57.914874586 +0000 UTC m=+14.099142609" lastFinishedPulling="2025-05-08 00:39:11.158804006 +0000 UTC m=+27.343072029" observedRunningTime="2025-05-08 00:39:12.010709662 +0000 UTC m=+28.194977685" watchObservedRunningTime="2025-05-08 00:39:16.997090031 +0000 UTC m=+33.181358054" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:16.998 [INFO][3385] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:16.998 [INFO][3385] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" iface="eth0" netns="/var/run/netns/cni-cc4083a8-9939-e90a-2d98-597ae8aac721" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:16.999 [INFO][3385] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" iface="eth0" netns="/var/run/netns/cni-cc4083a8-9939-e90a-2d98-597ae8aac721" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.000 [INFO][3385] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" iface="eth0" netns="/var/run/netns/cni-cc4083a8-9939-e90a-2d98-597ae8aac721" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.000 [INFO][3385] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.000 [INFO][3385] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.111 [INFO][3407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.111 [INFO][3407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.111 [INFO][3407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.124 [WARNING][3407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.124 [INFO][3407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.125 [INFO][3407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:17.129012 env[1220]: 2025-05-08 00:39:17.127 [INFO][3385] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:17.130728 env[1220]: time="2025-05-08T00:39:17.130687000Z" level=info msg="TearDown network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" successfully" May 8 00:39:17.130814 env[1220]: time="2025-05-08T00:39:17.130797000Z" level=info msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" returns successfully" May 8 00:39:17.131061 systemd[1]: run-netns-cni\x2dcc4083a8\x2d9939\x2de90a\x2d2d98\x2d597ae8aac721.mount: Deactivated successfully. May 8 00:39:17.131659 env[1220]: time="2025-05-08T00:39:17.131630640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-9lffc,Uid:d63149e1-4d91-4b94-acb3-5421d218b97f,Namespace:calico-apiserver,Attempt:1,}" May 8 00:39:17.267688 systemd-networkd[1045]: cali62dbd65115e: Link UP May 8 00:39:17.270568 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:39:17.271190 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62dbd65115e: link becomes ready May 8 00:39:17.270700 systemd-networkd[1045]: cali62dbd65115e: Gained carrier May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.162 [INFO][3417] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.181 [INFO][3417] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0 calico-apiserver-674b4d589- calico-apiserver d63149e1-4d91-4b94-acb3-5421d218b97f 805 0 2025-05-08 00:38:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:674b4d589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-674b4d589-9lffc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali62dbd65115e [] []}} ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.181 [INFO][3417] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.210 [INFO][3432] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" HandleID="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.223 [INFO][3432] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" HandleID="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8af0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-674b4d589-9lffc", "timestamp":"2025-05-08 00:39:17.210249149 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.223 [INFO][3432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.223 [INFO][3432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.223 [INFO][3432] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.225 [INFO][3432] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.234 [INFO][3432] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.238 [INFO][3432] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.240 [INFO][3432] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.242 [INFO][3432] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.242 [INFO][3432] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.245 [INFO][3432] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055 May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.248 [INFO][3432] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.253 [INFO][3432] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.253 [INFO][3432] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" host="localhost" May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.253 [INFO][3432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:17.284829 env[1220]: 2025-05-08 00:39:17.253 [INFO][3432] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" HandleID="k8s-pod-network.3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.255 [INFO][3417] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d63149e1-4d91-4b94-acb3-5421d218b97f", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-674b4d589-9lffc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62dbd65115e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.256 [INFO][3417] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.256 [INFO][3417] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali62dbd65115e ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.271 [INFO][3417] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.271 [INFO][3417] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d63149e1-4d91-4b94-acb3-5421d218b97f", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055", Pod:"calico-apiserver-674b4d589-9lffc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62dbd65115e", MAC:"7e:f1:4f:6f:c1:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:17.285546 env[1220]: 2025-05-08 00:39:17.280 [INFO][3417] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-9lffc" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:17.295194 env[1220]: time="2025-05-08T00:39:17.295121060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:17.295323 env[1220]: time="2025-05-08T00:39:17.295201180Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:17.295323 env[1220]: time="2025-05-08T00:39:17.295227860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:17.295483 env[1220]: time="2025-05-08T00:39:17.295451340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055 pid=3460 runtime=io.containerd.runc.v2 May 8 00:39:17.313937 systemd[1]: Started cri-containerd-3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055.scope. May 8 00:39:17.340633 kernel: kauditd_printk_skb: 79 callbacks suppressed May 8 00:39:17.340750 kernel: audit: type=1400 audit(1746664757.331:1023): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.340782 kernel: audit: type=1400 audit(1746664757.331:1024): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.340802 kernel: audit: type=1400 audit(1746664757.331:1025): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.340818 kernel: audit: type=1400 audit(1746664757.331:1026): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.345490 kernel: audit: type=1400 audit(1746664757.331:1027): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.345545 kernel: audit: type=1400 audit(1746664757.331:1028): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.347939 kernel: audit: type=1400 audit(1746664757.331:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.347801 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:17.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.353117 kernel: audit: type=1400 audit(1746664757.331:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.353186 kernel: audit: type=1400 audit(1746664757.331:1031): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.355456 kernel: audit: type=1400 audit(1746664757.331:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.331000 audit: BPF prog-id=139 op=LOAD May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3460 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663830316538373965393631633437326231396166313363643563 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3460 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663830316538373965393631633437326231396166313363643563 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.332000 audit: BPF prog-id=140 op=LOAD May 8 00:39:17.332000 audit[3470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3460 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663830316538373965393631633437326231396166313363643563 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.334000 audit: BPF prog-id=141 op=LOAD May 8 00:39:17.334000 audit[3470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3460 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663830316538373965393631633437326231396166313363643563 May 8 00:39:17.337000 audit: BPF prog-id=141 op=UNLOAD May 8 00:39:17.337000 audit: BPF prog-id=140 op=UNLOAD May 8 00:39:17.337000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.337000 audit: BPF prog-id=142 op=LOAD May 8 00:39:17.337000 audit[3470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3460 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663830316538373965393631633437326231396166313363643563 May 8 00:39:17.370837 env[1220]: time="2025-05-08T00:39:17.370796207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-9lffc,Uid:d63149e1-4d91-4b94-acb3-5421d218b97f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055\"" May 8 00:39:17.372363 env[1220]: time="2025-05-08T00:39:17.372304368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:39:17.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.58:22-10.0.0.1:45192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:17.409426 systemd[1]: Started sshd@8-10.0.0.58:22-10.0.0.1:45192.service. May 8 00:39:17.457000 audit[3495]: USER_ACCT pid=3495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.458631 sshd[3495]: Accepted publickey for core from 10.0.0.1 port 45192 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:17.458000 audit[3495]: CRED_ACQ pid=3495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.459000 audit[3495]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5707f90 a2=3 a3=1 items=0 ppid=1 pid=3495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:17.460175 sshd[3495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:17.464136 systemd-logind[1212]: New session 9 of user core. May 8 00:39:17.465138 systemd[1]: Started session-9.scope. May 8 00:39:17.468000 audit[3495]: USER_START pid=3495 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.469000 audit[3497]: CRED_ACQ pid=3497 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.633774 kubelet[1954]: I0508 00:39:17.633665 1954 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:39:17.634185 kubelet[1954]: E0508 00:39:17.634149 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:17.671493 sshd[3495]: pam_unix(sshd:session): session closed for user core May 8 00:39:17.671000 audit[3495]: USER_END pid=3495 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.671000 audit[3495]: CRED_DISP pid=3495 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:17.674102 systemd[1]: sshd@8-10.0.0.58:22-10.0.0.1:45192.service: Deactivated successfully. May 8 00:39:17.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.58:22-10.0.0.1:45192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:17.675015 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:39:17.675590 systemd-logind[1212]: Session 9 logged out. Waiting for processes to exit. May 8 00:39:17.676369 systemd-logind[1212]: Removed session 9. May 8 00:39:17.683000 audit[3509]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:17.683000 audit[3509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd4bdc3a0 a2=0 a3=1 items=0 ppid=2099 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:17.693000 audit[3509]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:17.693000 audit[3509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd4bdc3a0 a2=0 a3=1 items=0 ppid=2099 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit: BPF prog-id=143 op=LOAD May 8 00:39:17.968000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfe9f888 a2=98 a3=ffffcfe9f878 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.968000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:17.968000 audit: BPF prog-id=143 op=UNLOAD May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit: BPF prog-id=144 op=LOAD May 8 00:39:17.968000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcfe9f518 a2=74 a3=95 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.968000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:17.968000 audit: BPF prog-id=144 op=UNLOAD May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:17.968000 audit: BPF prog-id=145 op=LOAD May 8 00:39:17.968000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcfe9f578 a2=94 a3=2 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:17.968000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:17.968000 audit: BPF prog-id=145 op=UNLOAD May 8 00:39:18.008036 kubelet[1954]: E0508 00:39:18.007999 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:18.063000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.063000 audit: BPF prog-id=146 op=LOAD May 8 00:39:18.063000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcfe9f538 a2=40 a3=ffffcfe9f568 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.064000 audit: BPF prog-id=146 op=UNLOAD May 8 00:39:18.064000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.064000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcfe9f650 a2=50 a3=0 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.073000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.073000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f5a8 a2=28 a3=ffffcfe9f6d8 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.073000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.073000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.073000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfe9f5d8 a2=28 a3=ffffcfe9f708 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.073000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.074000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.074000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfe9f488 a2=28 a3=ffffcfe9f5b8 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.074000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.074000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.074000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f5f8 a2=28 a3=ffffcfe9f728 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.074000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.074000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.074000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f5d8 a2=28 a3=ffffcfe9f708 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.074000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.074000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.074000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f5c8 a2=28 a3=ffffcfe9f6f8 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.074000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.075000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.075000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f5f8 a2=28 a3=ffffcfe9f728 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.077000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.077000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfe9f5d8 a2=28 a3=ffffcfe9f708 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.077000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.077000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfe9f5f8 a2=28 a3=ffffcfe9f728 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.077000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.077000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfe9f5c8 a2=28 a3=ffffcfe9f6f8 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.077000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.077000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcfe9f648 a2=28 a3=ffffcfe9f788 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcfe9f380 a2=50 a3=0 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.078000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.078000 audit: BPF prog-id=147 op=LOAD May 8 00:39:18.078000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfe9f388 a2=94 a3=5 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.084000 audit: BPF prog-id=147 op=UNLOAD May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcfe9f490 a2=50 a3=0 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.084000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.084000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcfe9f5d8 a2=4 a3=3 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.084000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.084000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.084000 audit[3536]: AVC avc: denied { confidentiality } for pid=3536 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.084000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcfe9f5b8 a2=94 a3=6 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.084000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.085000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.085000 audit[3536]: AVC avc: denied { confidentiality } for pid=3536 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.085000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcfe9ed88 a2=94 a3=83 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.085000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.086000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.086000 audit[3536]: AVC avc: denied { confidentiality } for pid=3536 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.086000 audit[3536]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcfe9ed88 a2=94 a3=83 items=0 ppid=3512 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit: BPF prog-id=148 op=LOAD May 8 00:39:18.102000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb6a0008 a2=98 a3=fffffb69fff8 items=0 ppid=3512 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.102000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:39:18.102000 audit: BPF prog-id=148 op=UNLOAD May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit: BPF prog-id=149 op=LOAD May 8 00:39:18.102000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb69feb8 a2=74 a3=95 items=0 ppid=3512 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.102000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:39:18.102000 audit: BPF prog-id=149 op=UNLOAD May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.102000 audit: BPF prog-id=150 op=LOAD May 8 00:39:18.102000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb69fee8 a2=40 a3=fffffb69ff18 items=0 ppid=3512 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.102000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:39:18.102000 audit: BPF prog-id=150 op=UNLOAD May 8 00:39:18.131180 systemd[1]: run-containerd-runc-k8s.io-3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055-runc.rmkbQL.mount: Deactivated successfully. May 8 00:39:18.174744 systemd-networkd[1045]: vxlan.calico: Link UP May 8 00:39:18.174751 systemd-networkd[1045]: vxlan.calico: Gained carrier May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit: BPF prog-id=151 op=LOAD May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc26a31d8 a2=98 a3=ffffc26a31c8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit: BPF prog-id=151 op=UNLOAD May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit: BPF prog-id=152 op=LOAD May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc26a2eb8 a2=74 a3=95 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit: BPF prog-id=152 op=UNLOAD May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit: BPF prog-id=153 op=LOAD May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc26a2f18 a2=94 a3=2 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit: BPF prog-id=153 op=UNLOAD May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2f48 a2=28 a3=ffffc26a3078 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc26a2f78 a2=28 a3=ffffc26a30a8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc26a2e28 a2=28 a3=ffffc26a2f58 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2f98 a2=28 a3=ffffc26a30c8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2f78 a2=28 a3=ffffc26a30a8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.193000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.193000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2f68 a2=28 a3=ffffc26a3098 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2f98 a2=28 a3=ffffc26a30c8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc26a2f78 a2=28 a3=ffffc26a30a8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc26a2f98 a2=28 a3=ffffc26a30c8 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc26a2f68 a2=28 a3=ffffc26a3098 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc26a2fe8 a2=28 a3=ffffc26a3128 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.195000 audit: BPF prog-id=154 op=LOAD May 8 00:39:18.195000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc26a2e08 a2=40 a3=ffffc26a2e38 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.195000 audit: BPF prog-id=154 op=UNLOAD May 8 00:39:18.201000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.201000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc26a2e30 a2=50 a3=0 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.201000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc26a2e30 a2=50 a3=0 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.202000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit: BPF prog-id=155 op=LOAD May 8 00:39:18.202000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc26a2598 a2=94 a3=2 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.202000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.202000 audit: BPF prog-id=155 op=UNLOAD May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.202000 audit: BPF prog-id=156 op=LOAD May 8 00:39:18.202000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc26a2728 a2=94 a3=30 items=0 ppid=3512 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.202000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit: BPF prog-id=157 op=LOAD May 8 00:39:18.206000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffca2972b8 a2=98 a3=ffffca2972a8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.206000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.206000 audit: BPF prog-id=157 op=UNLOAD May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit: BPF prog-id=158 op=LOAD May 8 00:39:18.206000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffca296f48 a2=74 a3=95 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.206000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.206000 audit: BPF prog-id=158 op=UNLOAD May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.206000 audit: BPF prog-id=159 op=LOAD May 8 00:39:18.206000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffca296fa8 a2=94 a3=2 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.206000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.206000 audit: BPF prog-id=159 op=UNLOAD May 8 00:39:18.293000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.293000 audit: BPF prog-id=160 op=LOAD May 8 00:39:18.293000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffca296f68 a2=40 a3=ffffca296f98 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.298000 audit: BPF prog-id=160 op=UNLOAD May 8 00:39:18.298000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.298000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffca297080 a2=50 a3=0 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.298000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca296fd8 a2=28 a3=ffffca297108 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca297008 a2=28 a3=ffffca297138 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca296eb8 a2=28 a3=ffffca296fe8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca297028 a2=28 a3=ffffca297158 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca297008 a2=28 a3=ffffca297138 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca296ff8 a2=28 a3=ffffca297128 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca297028 a2=28 a3=ffffca297158 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca297008 a2=28 a3=ffffca297138 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca297028 a2=28 a3=ffffca297158 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca296ff8 a2=28 a3=ffffca297128 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca297078 a2=28 a3=ffffca2971b8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffca296db0 a2=50 a3=0 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.307000 audit: BPF prog-id=161 op=LOAD May 8 00:39:18.307000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffca296db8 a2=94 a3=5 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit: BPF prog-id=161 op=UNLOAD May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffca296ec0 a2=50 a3=0 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffca297008 a2=4 a3=3 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffca296fe8 a2=94 a3=6 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffca2967b8 a2=94 a3=83 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffca2967b8 a2=94 a3=83 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca2981f8 a2=10 a3=ffffca2982e8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca2980b8 a2=10 a3=ffffca2981a8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca298028 a2=10 a3=ffffca2981a8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.308000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:18.308000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca298028 a2=10 a3=ffffca2981a8 items=0 ppid=3512 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:39:18.328000 audit: BPF prog-id=156 op=UNLOAD May 8 00:39:18.381000 audit[3633]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3633 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:18.381000 audit[3633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffef3ba3b0 a2=0 a3=ffff95806fa8 items=0 ppid=3512 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.381000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:18.395000 audit[3632]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3632 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:18.395000 audit[3632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff7e5a070 a2=0 a3=ffffa010cfa8 items=0 ppid=3512 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:18.404000 audit[3631]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3631 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:18.404000 audit[3631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffcdfb9660 a2=0 a3=ffff9f4dcfa8 items=0 ppid=3512 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:18.406000 audit[3638]: NETFILTER_CFG table=filter:100 family=2 entries=75 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:18.406000 audit[3638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=40748 a0=3 a1=ffffd25dadb0 a2=0 a3=ffff932b2fa8 items=0 ppid=3512 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:18.406000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:18.734922 systemd-networkd[1045]: cali62dbd65115e: Gained IPv6LL May 8 00:39:18.902614 env[1220]: time="2025-05-08T00:39:18.902539464Z" level=info msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.959 [INFO][3661] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.959 [INFO][3661] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" iface="eth0" netns="/var/run/netns/cni-72dd7eeb-fc62-1428-e661-5789ce99ac33" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.959 [INFO][3661] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" iface="eth0" netns="/var/run/netns/cni-72dd7eeb-fc62-1428-e661-5789ce99ac33" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.960 [INFO][3661] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" iface="eth0" netns="/var/run/netns/cni-72dd7eeb-fc62-1428-e661-5789ce99ac33" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.960 [INFO][3661] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.960 [INFO][3661] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.989 [INFO][3670] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.989 [INFO][3670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.989 [INFO][3670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.998 [WARNING][3670] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:18.998 [INFO][3670] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:19.000 [INFO][3670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:19.006226 env[1220]: 2025-05-08 00:39:19.003 [INFO][3661] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:19.008515 systemd[1]: run-netns-cni\x2d72dd7eeb\x2dfc62\x2d1428\x2de661\x2d5789ce99ac33.mount: Deactivated successfully. May 8 00:39:19.009398 env[1220]: time="2025-05-08T00:39:19.009283620Z" level=info msg="TearDown network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" successfully" May 8 00:39:19.009398 env[1220]: time="2025-05-08T00:39:19.009331260Z" level=info msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" returns successfully" May 8 00:39:19.010110 env[1220]: time="2025-05-08T00:39:19.010081300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-ql6mv,Uid:df47b00b-4cf5-4427-b2b6-3e05198eeb27,Namespace:calico-apiserver,Attempt:1,}" May 8 00:39:19.138803 systemd-networkd[1045]: calia59de4c54b6: Link UP May 8 00:39:19.140629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia59de4c54b6: link becomes ready May 8 00:39:19.140777 systemd-networkd[1045]: calia59de4c54b6: Gained carrier May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.060 [INFO][3677] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0 calico-apiserver-674b4d589- calico-apiserver df47b00b-4cf5-4427-b2b6-3e05198eeb27 825 0 2025-05-08 00:38:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:674b4d589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-674b4d589-ql6mv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia59de4c54b6 [] []}} ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.060 [INFO][3677] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.091 [INFO][3693] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" HandleID="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.103 [INFO][3693] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" HandleID="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000294230), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-674b4d589-ql6mv", "timestamp":"2025-05-08 00:39:19.091512486 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.103 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.103 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.103 [INFO][3693] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.105 [INFO][3693] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.109 [INFO][3693] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.114 [INFO][3693] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.116 [INFO][3693] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.118 [INFO][3693] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.118 [INFO][3693] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.120 [INFO][3693] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.124 [INFO][3693] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.129 [INFO][3693] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.129 [INFO][3693] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" host="localhost" May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.130 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:19.167830 env[1220]: 2025-05-08 00:39:19.130 [INFO][3693] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" HandleID="k8s-pod-network.d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.137 [INFO][3677] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"df47b00b-4cf5-4427-b2b6-3e05198eeb27", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-674b4d589-ql6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia59de4c54b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.137 [INFO][3677] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.137 [INFO][3677] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia59de4c54b6 ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.141 [INFO][3677] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.141 [INFO][3677] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"df47b00b-4cf5-4427-b2b6-3e05198eeb27", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d", Pod:"calico-apiserver-674b4d589-ql6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia59de4c54b6", MAC:"2a:16:c6:72:93:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:19.168506 env[1220]: 2025-05-08 00:39:19.164 [INFO][3677] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d" Namespace="calico-apiserver" Pod="calico-apiserver-674b4d589-ql6mv" WorkloadEndpoint="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:19.180000 audit[3715]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:19.180000 audit[3715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20328 a0=3 a1=fffff82e9150 a2=0 a3=ffff9215afa8 items=0 ppid=3512 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.180000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:19.228497 env[1220]: time="2025-05-08T00:39:19.228421850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:19.228497 env[1220]: time="2025-05-08T00:39:19.228464850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:19.228497 env[1220]: time="2025-05-08T00:39:19.228474770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:19.232454 env[1220]: time="2025-05-08T00:39:19.228880130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d pid=3724 runtime=io.containerd.runc.v2 May 8 00:39:19.254420 systemd[1]: run-containerd-runc-k8s.io-d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d-runc.KmnZ7Y.mount: Deactivated successfully. May 8 00:39:19.256220 systemd[1]: Started cri-containerd-d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d.scope. May 8 00:39:19.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.310000 audit: BPF prog-id=162 op=LOAD May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000197b38 a2=10 a3=0 items=0 ppid=3724 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438313032376231316162653139316134353030663931643938373930 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001975a0 a2=3c a3=0 items=0 ppid=3724 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438313032376231316162653139316134353030663931643938373930 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit: BPF prog-id=163 op=LOAD May 8 00:39:19.311000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001978e0 a2=78 a3=0 items=0 ppid=3724 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438313032376231316162653139316134353030663931643938373930 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit: BPF prog-id=164 op=LOAD May 8 00:39:19.311000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000197670 a2=78 a3=0 items=0 ppid=3724 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438313032376231316162653139316134353030663931643938373930 May 8 00:39:19.311000 audit: BPF prog-id=164 op=UNLOAD May 8 00:39:19.311000 audit: BPF prog-id=163 op=UNLOAD May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.311000 audit: BPF prog-id=165 op=LOAD May 8 00:39:19.311000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000197b40 a2=78 a3=0 items=0 ppid=3724 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438313032376231316162653139316134353030663931643938373930 May 8 00:39:19.313715 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:19.330107 env[1220]: time="2025-05-08T00:39:19.330046803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-674b4d589-ql6mv,Uid:df47b00b-4cf5-4427-b2b6-3e05198eeb27,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d\"" May 8 00:39:19.400230 env[1220]: time="2025-05-08T00:39:19.400181665Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.401520 env[1220]: time="2025-05-08T00:39:19.401480345Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.402758 env[1220]: time="2025-05-08T00:39:19.402726626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.404259 env[1220]: time="2025-05-08T00:39:19.404224346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.404725 env[1220]: time="2025-05-08T00:39:19.404691267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 8 00:39:19.406603 env[1220]: time="2025-05-08T00:39:19.406552827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:39:19.407523 env[1220]: time="2025-05-08T00:39:19.407491627Z" level=info msg="CreateContainer within sandbox \"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:39:19.421980 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount560408386.mount: Deactivated successfully. May 8 00:39:19.422535 env[1220]: time="2025-05-08T00:39:19.422485112Z" level=info msg="CreateContainer within sandbox \"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6623ab81c4d04d0ae711703fd22130936f85530a3e1903a7d09f91a85cb94590\"" May 8 00:39:19.430672 env[1220]: time="2025-05-08T00:39:19.427643874Z" level=info msg="StartContainer for \"6623ab81c4d04d0ae711703fd22130936f85530a3e1903a7d09f91a85cb94590\"" May 8 00:39:19.450843 systemd[1]: Started cri-containerd-6623ab81c4d04d0ae711703fd22130936f85530a3e1903a7d09f91a85cb94590.scope. May 8 00:39:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit: BPF prog-id=166 op=LOAD May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3460 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323361623831633464303464306165373131373033666432323133 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3460 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323361623831633464303464306165373131373033666432323133 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.481000 audit: BPF prog-id=167 op=LOAD May 8 00:39:19.481000 audit[3765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3460 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323361623831633464303464306165373131373033666432323133 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit: BPF prog-id=168 op=LOAD May 8 00:39:19.482000 audit[3765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3460 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323361623831633464303464306165373131373033666432323133 May 8 00:39:19.482000 audit: BPF prog-id=168 op=UNLOAD May 8 00:39:19.482000 audit: BPF prog-id=167 op=UNLOAD May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.482000 audit: BPF prog-id=169 op=LOAD May 8 00:39:19.482000 audit[3765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3460 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323361623831633464303464306165373131373033666432323133 May 8 00:39:19.513332 env[1220]: time="2025-05-08T00:39:19.513218661Z" level=info msg="StartContainer for \"6623ab81c4d04d0ae711703fd22130936f85530a3e1903a7d09f91a85cb94590\" returns successfully" May 8 00:39:19.566995 systemd-networkd[1045]: vxlan.calico: Gained IPv6LL May 8 00:39:19.726626 env[1220]: time="2025-05-08T00:39:19.726561129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.728663 env[1220]: time="2025-05-08T00:39:19.728629650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.730374 env[1220]: time="2025-05-08T00:39:19.730341251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.732295 env[1220]: time="2025-05-08T00:39:19.732254211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:19.732972 env[1220]: time="2025-05-08T00:39:19.732639971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 8 00:39:19.736432 env[1220]: time="2025-05-08T00:39:19.736393213Z" level=info msg="CreateContainer within sandbox \"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:39:19.745668 env[1220]: time="2025-05-08T00:39:19.745624375Z" level=info msg="CreateContainer within sandbox \"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2b790a59310b02c0143a5876c1f1372b56077303bd7dc5539999f12e0e5a7ba3\"" May 8 00:39:19.746057 env[1220]: time="2025-05-08T00:39:19.746033216Z" level=info msg="StartContainer for \"2b790a59310b02c0143a5876c1f1372b56077303bd7dc5539999f12e0e5a7ba3\"" May 8 00:39:19.761211 systemd[1]: Started cri-containerd-2b790a59310b02c0143a5876c1f1372b56077303bd7dc5539999f12e0e5a7ba3.scope. May 8 00:39:19.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.799000 audit: BPF prog-id=170 op=LOAD May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3724 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373930613539333130623032633031343361353837366331663133 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3724 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373930613539333130623032633031343361353837366331663133 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit: BPF prog-id=171 op=LOAD May 8 00:39:19.800000 audit[3805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3724 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373930613539333130623032633031343361353837366331663133 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.800000 audit: BPF prog-id=172 op=LOAD May 8 00:39:19.800000 audit[3805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3724 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373930613539333130623032633031343361353837366331663133 May 8 00:39:19.801000 audit: BPF prog-id=172 op=UNLOAD May 8 00:39:19.801000 audit: BPF prog-id=171 op=UNLOAD May 8 00:39:19.801000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:19.801000 audit: BPF prog-id=173 op=LOAD May 8 00:39:19.801000 audit[3805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3724 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:19.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373930613539333130623032633031343361353837366331663133 May 8 00:39:19.821792 env[1220]: time="2025-05-08T00:39:19.821747440Z" level=info msg="StartContainer for \"2b790a59310b02c0143a5876c1f1372b56077303bd7dc5539999f12e0e5a7ba3\" returns successfully" May 8 00:39:19.902900 env[1220]: time="2025-05-08T00:39:19.902856426Z" level=info msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" iface="eth0" netns="/var/run/netns/cni-5464b83c-a256-16f6-26f0-cf1b2cbc2a13" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" iface="eth0" netns="/var/run/netns/cni-5464b83c-a256-16f6-26f0-cf1b2cbc2a13" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" iface="eth0" netns="/var/run/netns/cni-5464b83c-a256-16f6-26f0-cf1b2cbc2a13" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.965 [INFO][3851] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.988 [INFO][3860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.988 [INFO][3860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:19.988 [INFO][3860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:20.005 [WARNING][3860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:20.006 [INFO][3860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:20.010 [INFO][3860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:20.018228 env[1220]: 2025-05-08 00:39:20.013 [INFO][3851] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:20.018792 env[1220]: time="2025-05-08T00:39:20.018362662Z" level=info msg="TearDown network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" successfully" May 8 00:39:20.018792 env[1220]: time="2025-05-08T00:39:20.018391342Z" level=info msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" returns successfully" May 8 00:39:20.024945 kubelet[1954]: E0508 00:39:20.024909 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:20.025684 env[1220]: time="2025-05-08T00:39:20.025632144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-t66vb,Uid:beed0031-63b3-43c1-a16a-bff4ae2fb2f9,Namespace:kube-system,Attempt:1,}" May 8 00:39:20.047509 kubelet[1954]: I0508 00:39:20.046930 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-674b4d589-ql6mv" podStartSLOduration=22.643007342 podStartE2EDuration="23.046902591s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:39:19.331179523 +0000 UTC m=+35.515447546" lastFinishedPulling="2025-05-08 00:39:19.735074772 +0000 UTC m=+35.919342795" observedRunningTime="2025-05-08 00:39:20.028547225 +0000 UTC m=+36.212815248" watchObservedRunningTime="2025-05-08 00:39:20.046902591 +0000 UTC m=+36.231170614" May 8 00:39:20.047509 kubelet[1954]: I0508 00:39:20.047240 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-674b4d589-9lffc" podStartSLOduration=21.013178852 podStartE2EDuration="23.047233791s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:39:17.372090248 +0000 UTC m=+33.556358271" lastFinishedPulling="2025-05-08 00:39:19.406145227 +0000 UTC m=+35.590413210" observedRunningTime="2025-05-08 00:39:20.046986871 +0000 UTC m=+36.231254894" watchObservedRunningTime="2025-05-08 00:39:20.047233791 +0000 UTC m=+36.231501814" May 8 00:39:20.055000 audit[3869]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:20.055000 audit[3869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcf587c70 a2=0 a3=1 items=0 ppid=2099 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:20.059000 audit[3869]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:20.059000 audit[3869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcf587c70 a2=0 a3=1 items=0 ppid=2099 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:20.070000 audit[3883]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:20.070000 audit[3883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffffe3f8c0 a2=0 a3=1 items=0 ppid=2099 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:20.076000 audit[3883]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:20.076000 audit[3883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffffe3f8c0 a2=0 a3=1 items=0 ppid=2099 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:20.207540 systemd-networkd[1045]: cali5d1fa9cf8f5: Link UP May 8 00:39:20.209663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:39:20.209744 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d1fa9cf8f5: link becomes ready May 8 00:39:20.209791 systemd-networkd[1045]: cali5d1fa9cf8f5: Gained carrier May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.096 [INFO][3870] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--t66vb-eth0 coredns-668d6bf9bc- kube-system beed0031-63b3-43c1-a16a-bff4ae2fb2f9 842 0 2025-05-08 00:38:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-t66vb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5d1fa9cf8f5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.096 [INFO][3870] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.134 [INFO][3887] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" HandleID="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.147 [INFO][3887] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" HandleID="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400055dd50), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-t66vb", "timestamp":"2025-05-08 00:39:20.134153537 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.147 [INFO][3887] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.148 [INFO][3887] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.148 [INFO][3887] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.150 [INFO][3887] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.156 [INFO][3887] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.170 [INFO][3887] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.178 [INFO][3887] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.181 [INFO][3887] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.181 [INFO][3887] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.185 [INFO][3887] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953 May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.195 [INFO][3887] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.202 [INFO][3887] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.202 [INFO][3887] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" host="localhost" May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.202 [INFO][3887] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:20.227222 env[1220]: 2025-05-08 00:39:20.202 [INFO][3887] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" HandleID="k8s-pod-network.7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.204 [INFO][3870] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--t66vb-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"beed0031-63b3-43c1-a16a-bff4ae2fb2f9", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-t66vb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5d1fa9cf8f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.205 [INFO][3870] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.205 [INFO][3870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5d1fa9cf8f5 ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.210 [INFO][3870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.212 [INFO][3870] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--t66vb-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"beed0031-63b3-43c1-a16a-bff4ae2fb2f9", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953", Pod:"coredns-668d6bf9bc-t66vb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5d1fa9cf8f5", MAC:"ba:15:ae:c0:a7:99", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:20.227859 env[1220]: 2025-05-08 00:39:20.224 [INFO][3870] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953" Namespace="kube-system" Pod="coredns-668d6bf9bc-t66vb" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:20.238248 systemd[1]: run-netns-cni\x2d5464b83c\x2da256\x2d16f6\x2d26f0\x2dcf1b2cbc2a13.mount: Deactivated successfully. May 8 00:39:20.242000 audit[3909]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:20.242000 audit[3909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=fffff8605630 a2=0 a3=ffff9e776fa8 items=0 ppid=3512 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.242000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:20.261543 env[1220]: time="2025-05-08T00:39:20.261021975Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:20.261543 env[1220]: time="2025-05-08T00:39:20.261074415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:20.261543 env[1220]: time="2025-05-08T00:39:20.261084775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:20.261543 env[1220]: time="2025-05-08T00:39:20.261221015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953 pid=3917 runtime=io.containerd.runc.v2 May 8 00:39:20.276556 systemd[1]: Started cri-containerd-7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953.scope. May 8 00:39:20.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.309000 audit: BPF prog-id=174 op=LOAD May 8 00:39:20.310000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.310000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646361636132373938663134623236346233663037336434353566 May 8 00:39:20.310000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.310000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646361636132373938663134623236346233663037336434353566 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.311000 audit: BPF prog-id=175 op=LOAD May 8 00:39:20.311000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646361636132373938663134623236346233663037336434353566 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.312000 audit: BPF prog-id=176 op=LOAD May 8 00:39:20.312000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646361636132373938663134623236346233663037336434353566 May 8 00:39:20.313000 audit: BPF prog-id=176 op=UNLOAD May 8 00:39:20.313000 audit: BPF prog-id=175 op=UNLOAD May 8 00:39:20.313000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.313000 audit: BPF prog-id=177 op=LOAD May 8 00:39:20.313000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646361636132373938663134623236346233663037336434353566 May 8 00:39:20.315403 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:20.351897 env[1220]: time="2025-05-08T00:39:20.351852682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-t66vb,Uid:beed0031-63b3-43c1-a16a-bff4ae2fb2f9,Namespace:kube-system,Attempt:1,} returns sandbox id \"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953\"" May 8 00:39:20.352804 kubelet[1954]: E0508 00:39:20.352770 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:20.354875 env[1220]: time="2025-05-08T00:39:20.354835803Z" level=info msg="CreateContainer within sandbox \"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:39:20.373188 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2889581808.mount: Deactivated successfully. May 8 00:39:20.387777 env[1220]: time="2025-05-08T00:39:20.387718333Z" level=info msg="CreateContainer within sandbox \"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"aa2c81f51d16f452141b90c3b6cc2701f27a1473df46bd5801f3167e426f4387\"" May 8 00:39:20.388297 env[1220]: time="2025-05-08T00:39:20.388261253Z" level=info msg="StartContainer for \"aa2c81f51d16f452141b90c3b6cc2701f27a1473df46bd5801f3167e426f4387\"" May 8 00:39:20.416399 systemd[1]: Started cri-containerd-aa2c81f51d16f452141b90c3b6cc2701f27a1473df46bd5801f3167e426f4387.scope. May 8 00:39:20.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit: BPF prog-id=178 op=LOAD May 8 00:39:20.440000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.440000 audit[3959]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326338316635316431366634353231343162393063336236636332 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326338316635316431366634353231343162393063336236636332 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit: BPF prog-id=179 op=LOAD May 8 00:39:20.441000 audit[3959]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326338316635316431366634353231343162393063336236636332 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit: BPF prog-id=180 op=LOAD May 8 00:39:20.441000 audit[3959]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326338316635316431366634353231343162393063336236636332 May 8 00:39:20.441000 audit: BPF prog-id=180 op=UNLOAD May 8 00:39:20.441000 audit: BPF prog-id=179 op=UNLOAD May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:20.441000 audit: BPF prog-id=181 op=LOAD May 8 00:39:20.441000 audit[3959]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:20.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326338316635316431366634353231343162393063336236636332 May 8 00:39:20.460667 env[1220]: time="2025-05-08T00:39:20.460539435Z" level=info msg="StartContainer for \"aa2c81f51d16f452141b90c3b6cc2701f27a1473df46bd5801f3167e426f4387\" returns successfully" May 8 00:39:20.546000 audit[3969]: AVC avc: denied { getattr } for pid=3969 comm="coredns" path="cgroup:[4026532435]" dev="nsfs" ino=4026532435 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c127 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:39:20.546000 audit[3969]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056a38 a2=40001ce578 a3=0 items=0 ppid=3917 pid=3969 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c127 key=(null) May 8 00:39:20.546000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:39:20.657000 audit[3776]: AVC avc: denied { watch } for pid=3776 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_39_05.2178440518/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c527,c811 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c527,c811 tclass=file permissive=0 May 8 00:39:20.657000 audit[3776]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000464920 a2=fc6 a3=0 items=0 ppid=3460 pid=3776 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c527,c811 key=(null) May 8 00:39:20.657000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:39:20.902435 env[1220]: time="2025-05-08T00:39:20.902388727Z" level=info msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" May 8 00:39:20.902923 env[1220]: time="2025-05-08T00:39:20.902893647Z" level=info msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" May 8 00:39:20.903179 env[1220]: time="2025-05-08T00:39:20.902949247Z" level=info msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" May 8 00:39:20.980440 systemd-networkd[1045]: calia59de4c54b6: Gained IPv6LL May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.967 [INFO][4040] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.967 [INFO][4040] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" iface="eth0" netns="/var/run/netns/cni-9e0d3b32-6513-9dce-da68-a8235e4ff9b3" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.967 [INFO][4040] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" iface="eth0" netns="/var/run/netns/cni-9e0d3b32-6513-9dce-da68-a8235e4ff9b3" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.968 [INFO][4040] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" iface="eth0" netns="/var/run/netns/cni-9e0d3b32-6513-9dce-da68-a8235e4ff9b3" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.968 [INFO][4040] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:20.968 [INFO][4040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.000 [INFO][4064] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.000 [INFO][4064] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.001 [INFO][4064] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.010 [WARNING][4064] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.010 [INFO][4064] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.012 [INFO][4064] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.017813 env[1220]: 2025-05-08 00:39:21.014 [INFO][4040] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:21.018411 env[1220]: time="2025-05-08T00:39:21.017976241Z" level=info msg="TearDown network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" successfully" May 8 00:39:21.018411 env[1220]: time="2025-05-08T00:39:21.018007002Z" level=info msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" returns successfully" May 8 00:39:21.018476 kubelet[1954]: E0508 00:39:21.018297 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:21.019044 env[1220]: time="2025-05-08T00:39:21.019009722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wnc5,Uid:0879df54-64ba-4699-9a0f-25d5ec902580,Namespace:kube-system,Attempt:1,}" May 8 00:39:21.042907 kubelet[1954]: I0508 00:39:21.031399 1954 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:39:21.042907 kubelet[1954]: E0508 00:39:21.031942 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:21.067332 kubelet[1954]: I0508 00:39:21.066657 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-t66vb" podStartSLOduration=30.066639695 podStartE2EDuration="30.066639695s" podCreationTimestamp="2025-05-08 00:38:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:21.04977009 +0000 UTC m=+37.234038193" watchObservedRunningTime="2025-05-08 00:39:21.066639695 +0000 UTC m=+37.250907718" May 8 00:39:21.079000 audit[4103]: NETFILTER_CFG table=filter:107 family=2 entries=15 op=nft_register_rule pid=4103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:21.079000 audit[4103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff29a2850 a2=0 a3=1 items=0 ppid=2099 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.983 [INFO][4037] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.983 [INFO][4037] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" iface="eth0" netns="/var/run/netns/cni-5eb9c6e3-ede9-1a1b-8b79-fda4d3fdea28" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.984 [INFO][4037] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" iface="eth0" netns="/var/run/netns/cni-5eb9c6e3-ede9-1a1b-8b79-fda4d3fdea28" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.984 [INFO][4037] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" iface="eth0" netns="/var/run/netns/cni-5eb9c6e3-ede9-1a1b-8b79-fda4d3fdea28" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.984 [INFO][4037] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:20.984 [INFO][4037] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.047 [INFO][4071] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.048 [INFO][4071] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.048 [INFO][4071] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.071 [WARNING][4071] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.071 [INFO][4071] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.075 [INFO][4071] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.082776 env[1220]: 2025-05-08 00:39:21.077 [INFO][4037] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:21.083227 env[1220]: time="2025-05-08T00:39:21.082947100Z" level=info msg="TearDown network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" successfully" May 8 00:39:21.083227 env[1220]: time="2025-05-08T00:39:21.082982140Z" level=info msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" returns successfully" May 8 00:39:21.084269 env[1220]: time="2025-05-08T00:39:21.084238380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl96g,Uid:d3d376fe-5d96-47d8-8530-176f83a0cb2e,Namespace:calico-system,Attempt:1,}" May 8 00:39:21.085000 audit[4103]: NETFILTER_CFG table=nat:108 family=2 entries=21 op=nft_register_chain pid=4103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:21.085000 audit[4103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7044 a0=3 a1=fffff29a2850 a2=0 a3=1 items=0 ppid=2099 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.990 [INFO][4051] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.990 [INFO][4051] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" iface="eth0" netns="/var/run/netns/cni-3927f4a3-aff8-d7a0-af17-e0c404406d33" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.990 [INFO][4051] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" iface="eth0" netns="/var/run/netns/cni-3927f4a3-aff8-d7a0-af17-e0c404406d33" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.991 [INFO][4051] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" iface="eth0" netns="/var/run/netns/cni-3927f4a3-aff8-d7a0-af17-e0c404406d33" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.991 [INFO][4051] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:20.991 [INFO][4051] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.052 [INFO][4077] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.053 [INFO][4077] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.075 [INFO][4077] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.087 [WARNING][4077] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.087 [INFO][4077] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.090 [INFO][4077] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.094033 env[1220]: 2025-05-08 00:39:21.092 [INFO][4051] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:21.094567 env[1220]: time="2025-05-08T00:39:21.094180983Z" level=info msg="TearDown network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" successfully" May 8 00:39:21.094567 env[1220]: time="2025-05-08T00:39:21.094209663Z" level=info msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" returns successfully" May 8 00:39:21.095297 env[1220]: time="2025-05-08T00:39:21.095256023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59c8886cdc-h62qq,Uid:67da260b-a9cf-4fc5-a3e9-4921c1fb24d8,Namespace:calico-system,Attempt:1,}" May 8 00:39:21.127000 audit[3815]: AVC avc: denied { watch } for pid=3815 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_39_05.4085172408/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c180 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c91,c180 tclass=file permissive=0 May 8 00:39:21.127000 audit[3815]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b4be80 a2=fc6 a3=0 items=0 ppid=3724 pid=3815 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c180 key=(null) May 8 00:39:21.127000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:39:21.239305 systemd[1]: run-netns-cni\x2d5eb9c6e3\x2dede9\x2d1a1b\x2d8b79\x2dfda4d3fdea28.mount: Deactivated successfully. May 8 00:39:21.239385 systemd[1]: run-netns-cni\x2d9e0d3b32\x2d6513\x2d9dce\x2dda68\x2da8235e4ff9b3.mount: Deactivated successfully. May 8 00:39:21.239431 systemd[1]: run-netns-cni\x2d3927f4a3\x2daff8\x2dd7a0\x2daf17\x2de0c404406d33.mount: Deactivated successfully. May 8 00:39:21.340401 systemd-networkd[1045]: calie61d1162772: Link UP May 8 00:39:21.343495 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:39:21.343582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie61d1162772: link becomes ready May 8 00:39:21.342529 systemd-networkd[1045]: calie61d1162772: Gained carrier May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.135 [INFO][4089] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0 coredns-668d6bf9bc- kube-system 0879df54-64ba-4699-9a0f-25d5ec902580 875 0 2025-05-08 00:38:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-6wnc5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie61d1162772 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.135 [INFO][4089] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.179 [INFO][4134] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" HandleID="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.296 [INFO][4134] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" HandleID="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004ca80), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-6wnc5", "timestamp":"2025-05-08 00:39:21.179159927 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.296 [INFO][4134] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.297 [INFO][4134] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.297 [INFO][4134] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.302 [INFO][4134] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.306 [INFO][4134] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.314 [INFO][4134] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.318 [INFO][4134] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.322 [INFO][4134] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.322 [INFO][4134] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.324 [INFO][4134] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487 May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.330 [INFO][4134] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.336 [INFO][4134] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.336 [INFO][4134] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" host="localhost" May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.336 [INFO][4134] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.358762 env[1220]: 2025-05-08 00:39:21.336 [INFO][4134] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" HandleID="k8s-pod-network.109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.338 [INFO][4089] cni-plugin/k8s.go 386: Populated endpoint ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0879df54-64ba-4699-9a0f-25d5ec902580", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-6wnc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie61d1162772", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.338 [INFO][4089] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.338 [INFO][4089] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie61d1162772 ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.340 [INFO][4089] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.342 [INFO][4089] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0879df54-64ba-4699-9a0f-25d5ec902580", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487", Pod:"coredns-668d6bf9bc-6wnc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie61d1162772", MAC:"36:38:76:1f:2e:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.359370 env[1220]: 2025-05-08 00:39:21.356 [INFO][4089] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wnc5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:21.381934 env[1220]: time="2025-05-08T00:39:21.381487384Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:21.381934 env[1220]: time="2025-05-08T00:39:21.381528504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:21.381934 env[1220]: time="2025-05-08T00:39:21.381537904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:21.381934 env[1220]: time="2025-05-08T00:39:21.381859704Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487 pid=4185 runtime=io.containerd.runc.v2 May 8 00:39:21.382000 audit[4184]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=4184 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:21.382000 audit[4184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=fffff43fea30 a2=0 a3=ffffa01b7fa8 items=0 ppid=3512 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.382000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:21.404439 systemd[1]: run-containerd-runc-k8s.io-109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487-runc.4lRSXS.mount: Deactivated successfully. May 8 00:39:21.407168 systemd[1]: Started cri-containerd-109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487.scope. May 8 00:39:21.463676 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie0736efc027: link becomes ready May 8 00:39:21.465508 systemd-networkd[1045]: calie0736efc027: Link UP May 8 00:39:21.465789 systemd-networkd[1045]: calie0736efc027: Gained carrier May 8 00:39:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.480000 audit: BPF prog-id=182 op=LOAD May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4185 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396365613833633563356265643038376636666538366530326362 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4185 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396365613833633563356265643038376636666538366530326362 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit: BPF prog-id=183 op=LOAD May 8 00:39:21.481000 audit[4195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4185 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396365613833633563356265643038376636666538366530326362 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit: BPF prog-id=184 op=LOAD May 8 00:39:21.481000 audit[4195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4185 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396365613833633563356265643038376636666538366530326362 May 8 00:39:21.481000 audit: BPF prog-id=184 op=UNLOAD May 8 00:39:21.481000 audit: BPF prog-id=183 op=UNLOAD May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.481000 audit: BPF prog-id=185 op=LOAD May 8 00:39:21.481000 audit[4195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4185 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396365613833633563356265643038376636666538366530326362 May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.159 [INFO][4105] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--zl96g-eth0 csi-node-driver- calico-system d3d376fe-5d96-47d8-8530-176f83a0cb2e 876 0 2025-05-08 00:38:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-zl96g eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie0736efc027 [] []}} ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.160 [INFO][4105] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.209 [INFO][4145] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" HandleID="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.301 [INFO][4145] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" HandleID="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003aad00), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-zl96g", "timestamp":"2025-05-08 00:39:21.209673695 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.301 [INFO][4145] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.336 [INFO][4145] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.336 [INFO][4145] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.405 [INFO][4145] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.414 [INFO][4145] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.429 [INFO][4145] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.433 [INFO][4145] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.436 [INFO][4145] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.436 [INFO][4145] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.441 [INFO][4145] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1 May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.444 [INFO][4145] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.453 [INFO][4145] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.453 [INFO][4145] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" host="localhost" May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.453 [INFO][4145] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.485170 env[1220]: 2025-05-08 00:39:21.453 [INFO][4145] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" HandleID="k8s-pod-network.806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.485439 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.457 [INFO][4105] cni-plugin/k8s.go 386: Populated endpoint ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--zl96g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3d376fe-5d96-47d8-8530-176f83a0cb2e", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-zl96g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie0736efc027", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.457 [INFO][4105] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.457 [INFO][4105] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie0736efc027 ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.463 [INFO][4105] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.468 [INFO][4105] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--zl96g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3d376fe-5d96-47d8-8530-176f83a0cb2e", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1", Pod:"csi-node-driver-zl96g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie0736efc027", MAC:"b6:a6:b6:a5:e1:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.486211 env[1220]: 2025-05-08 00:39:21.481 [INFO][4105] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1" Namespace="calico-system" Pod="csi-node-driver-zl96g" WorkloadEndpoint="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:21.504803 env[1220]: time="2025-05-08T00:39:21.503676018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:21.504803 env[1220]: time="2025-05-08T00:39:21.503721218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:21.504803 env[1220]: time="2025-05-08T00:39:21.503731458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:21.504803 env[1220]: time="2025-05-08T00:39:21.503857018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1 pid=4232 runtime=io.containerd.runc.v2 May 8 00:39:21.516000 audit[4246]: NETFILTER_CFG table=filter:110 family=2 entries=56 op=nft_register_chain pid=4246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:21.516000 audit[4246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26752 a0=3 a1=ffffd269a040 a2=0 a3=ffff8e2a9fa8 items=0 ppid=3512 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:21.526552 systemd[1]: Started cri-containerd-806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1.scope. May 8 00:39:21.529408 env[1220]: time="2025-05-08T00:39:21.529363265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wnc5,Uid:0879df54-64ba-4699-9a0f-25d5ec902580,Namespace:kube-system,Attempt:1,} returns sandbox id \"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487\"" May 8 00:39:21.530402 kubelet[1954]: E0508 00:39:21.530376 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:21.538218 env[1220]: time="2025-05-08T00:39:21.538182148Z" level=info msg="CreateContainer within sandbox \"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:39:21.558969 systemd-networkd[1045]: cali95851f539b7: Link UP May 8 00:39:21.560652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali95851f539b7: link becomes ready May 8 00:39:21.560868 env[1220]: time="2025-05-08T00:39:21.560810754Z" level=info msg="CreateContainer within sandbox \"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"39244e8a989428b1eb7c9ccbf3d86e2a4c0d26051beae8d1f2d73f54c718f529\"" May 8 00:39:21.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.560000 audit: BPF prog-id=186 op=LOAD May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4232 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830366333626664343132333565343364366639333062323138323162 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4232 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830366333626664343132333565343364366639333062323138323162 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit: BPF prog-id=187 op=LOAD May 8 00:39:21.561000 audit[4244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4232 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830366333626664343132333565343364366639333062323138323162 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit: BPF prog-id=188 op=LOAD May 8 00:39:21.561000 audit[4244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4232 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830366333626664343132333565343364366639333062323138323162 May 8 00:39:21.561000 audit: BPF prog-id=188 op=UNLOAD May 8 00:39:21.561000 audit: BPF prog-id=187 op=UNLOAD May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.561000 audit: BPF prog-id=189 op=LOAD May 8 00:39:21.561000 audit[4244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4232 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830366333626664343132333565343364366639333062323138323162 May 8 00:39:21.562409 systemd-networkd[1045]: cali95851f539b7: Gained carrier May 8 00:39:21.566238 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:21.569462 env[1220]: time="2025-05-08T00:39:21.569422956Z" level=info msg="StartContainer for \"39244e8a989428b1eb7c9ccbf3d86e2a4c0d26051beae8d1f2d73f54c718f529\"" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.178 [INFO][4121] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0 calico-kube-controllers-59c8886cdc- calico-system 67da260b-a9cf-4fc5-a3e9-4921c1fb24d8 877 0 2025-05-08 00:38:57 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:59c8886cdc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-59c8886cdc-h62qq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali95851f539b7 [] []}} ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.178 [INFO][4121] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.222 [INFO][4152] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" HandleID="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.302 [INFO][4152] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" HandleID="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000284eb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-59c8886cdc-h62qq", "timestamp":"2025-05-08 00:39:21.222331939 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.302 [INFO][4152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.454 [INFO][4152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.455 [INFO][4152] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.509 [INFO][4152] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.514 [INFO][4152] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.530 [INFO][4152] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.536 [INFO][4152] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.541 [INFO][4152] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.541 [INFO][4152] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.544 [INFO][4152] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63 May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.549 [INFO][4152] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.554 [INFO][4152] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.554 [INFO][4152] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" host="localhost" May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.554 [INFO][4152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:21.579331 env[1220]: 2025-05-08 00:39:21.554 [INFO][4152] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" HandleID="k8s-pod-network.7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.557 [INFO][4121] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0", GenerateName:"calico-kube-controllers-59c8886cdc-", Namespace:"calico-system", SelfLink:"", UID:"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59c8886cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-59c8886cdc-h62qq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali95851f539b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.557 [INFO][4121] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.557 [INFO][4121] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali95851f539b7 ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.560 [INFO][4121] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.567 [INFO][4121] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0", GenerateName:"calico-kube-controllers-59c8886cdc-", Namespace:"calico-system", SelfLink:"", UID:"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59c8886cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63", Pod:"calico-kube-controllers-59c8886cdc-h62qq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali95851f539b7", MAC:"76:14:ad:15:30:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:21.579956 env[1220]: 2025-05-08 00:39:21.576 [INFO][4121] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63" Namespace="calico-system" Pod="calico-kube-controllers-59c8886cdc-h62qq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:21.582745 env[1220]: time="2025-05-08T00:39:21.582703720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl96g,Uid:d3d376fe-5d96-47d8-8530-176f83a0cb2e,Namespace:calico-system,Attempt:1,} returns sandbox id \"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1\"" May 8 00:39:21.588199 env[1220]: time="2025-05-08T00:39:21.588166402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:39:21.592000 audit[4299]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:39:21.592000 audit[4299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22188 a0=3 a1=fffffdc93680 a2=0 a3=ffffb2836fa8 items=0 ppid=3512 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.592000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:39:21.597825 systemd[1]: Started cri-containerd-39244e8a989428b1eb7c9ccbf3d86e2a4c0d26051beae8d1f2d73f54c718f529.scope. May 8 00:39:21.604948 env[1220]: time="2025-05-08T00:39:21.604083246Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:39:21.604948 env[1220]: time="2025-05-08T00:39:21.604130886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:39:21.604948 env[1220]: time="2025-05-08T00:39:21.604141246Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:39:21.604948 env[1220]: time="2025-05-08T00:39:21.604260246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63 pid=4314 runtime=io.containerd.runc.v2 May 8 00:39:21.615523 systemd[1]: Started cri-containerd-7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63.scope. May 8 00:39:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.621000 audit: BPF prog-id=190 op=LOAD May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4185 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339323434653861393839343238623165623763396363626633643836 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4185 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339323434653861393839343238623165623763396363626633643836 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.622000 audit: BPF prog-id=191 op=LOAD May 8 00:39:21.622000 audit[4287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4185 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339323434653861393839343238623165623763396363626633643836 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.623000 audit: BPF prog-id=192 op=LOAD May 8 00:39:21.623000 audit[4287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4185 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339323434653861393839343238623165623763396363626633643836 May 8 00:39:21.624000 audit: BPF prog-id=192 op=UNLOAD May 8 00:39:21.624000 audit: BPF prog-id=191 op=UNLOAD May 8 00:39:21.624000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.624000 audit: BPF prog-id=193 op=LOAD May 8 00:39:21.624000 audit[4287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4185 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339323434653861393839343238623165623763396363626633643836 May 8 00:39:21.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.637000 audit: BPF prog-id=194 op=LOAD May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4314 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762666262613766636365623133323331386333373632313530656466 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4314 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762666262613766636365623133323331386333373632313530656466 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit: BPF prog-id=195 op=LOAD May 8 00:39:21.638000 audit[4330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4314 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762666262613766636365623133323331386333373632313530656466 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit: BPF prog-id=196 op=LOAD May 8 00:39:21.638000 audit[4330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4314 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762666262613766636365623133323331386333373632313530656466 May 8 00:39:21.638000 audit: BPF prog-id=196 op=UNLOAD May 8 00:39:21.638000 audit: BPF prog-id=195 op=UNLOAD May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { perfmon } for pid=4330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit[4330]: AVC avc: denied { bpf } for pid=4330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:21.638000 audit: BPF prog-id=197 op=LOAD May 8 00:39:21.638000 audit[4330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4314 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:21.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762666262613766636365623133323331386333373632313530656466 May 8 00:39:21.640548 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:39:21.643455 env[1220]: time="2025-05-08T00:39:21.643389657Z" level=info msg="StartContainer for \"39244e8a989428b1eb7c9ccbf3d86e2a4c0d26051beae8d1f2d73f54c718f529\" returns successfully" May 8 00:39:21.654000 audit[4321]: AVC avc: denied { getattr } for pid=4321 comm="coredns" path="cgroup:[4026532269]" dev="nsfs" ino=4026532269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c899 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:39:21.654000 audit[4321]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40001cc9a8 a2=40001ce578 a3=0 items=0 ppid=4185 pid=4321 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c899 key=(null) May 8 00:39:21.654000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:39:21.682038 env[1220]: time="2025-05-08T00:39:21.681988508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59c8886cdc-h62qq,Uid:67da260b-a9cf-4fc5-a3e9-4921c1fb24d8,Namespace:calico-system,Attempt:1,} returns sandbox id \"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63\"" May 8 00:39:22.037271 kubelet[1954]: E0508 00:39:22.037219 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:22.037412 kubelet[1954]: E0508 00:39:22.037343 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:22.060350 kubelet[1954]: I0508 00:39:22.060273 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6wnc5" podStartSLOduration=31.060256573 podStartE2EDuration="31.060256573s" podCreationTimestamp="2025-05-08 00:38:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:39:22.04960829 +0000 UTC m=+38.233876313" watchObservedRunningTime="2025-05-08 00:39:22.060256573 +0000 UTC m=+38.244524596" May 8 00:39:22.061000 audit[4373]: NETFILTER_CFG table=filter:112 family=2 entries=11 op=nft_register_rule pid=4373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:22.061000 audit[4373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc5baadb0 a2=0 a3=1 items=0 ppid=2099 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:22.062706 systemd-networkd[1045]: cali5d1fa9cf8f5: Gained IPv6LL May 8 00:39:22.068000 audit[4373]: NETFILTER_CFG table=nat:113 family=2 entries=37 op=nft_register_chain pid=4373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:22.068000 audit[4373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=ffffc5baadb0 a2=0 a3=1 items=0 ppid=2099 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:22.639500 env[1220]: time="2025-05-08T00:39:22.639418686Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.641277 env[1220]: time="2025-05-08T00:39:22.641233806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.643186 env[1220]: time="2025-05-08T00:39:22.643150967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.644611 env[1220]: time="2025-05-08T00:39:22.644577607Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:22.645155 env[1220]: time="2025-05-08T00:39:22.645123967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 8 00:39:22.646374 env[1220]: time="2025-05-08T00:39:22.646176288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:39:22.648724 env[1220]: time="2025-05-08T00:39:22.648689888Z" level=info msg="CreateContainer within sandbox \"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:39:22.676160 systemd[1]: Started sshd@9-10.0.0.58:22-10.0.0.1:42204.service. May 8 00:39:22.677505 kernel: kauditd_printk_skb: 1108 callbacks suppressed May 8 00:39:22.677543 kernel: audit: type=1130 audit(1746664762.675:1326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:22.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:22.716657 env[1220]: time="2025-05-08T00:39:22.716585866Z" level=info msg="CreateContainer within sandbox \"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4da232ca04d85dec3b9d4d02bf7634ca5c0749b6edac5911a8d1a12cfc431fbb\"" May 8 00:39:22.717963 env[1220]: time="2025-05-08T00:39:22.717545226Z" level=info msg="StartContainer for \"4da232ca04d85dec3b9d4d02bf7634ca5c0749b6edac5911a8d1a12cfc431fbb\"" May 8 00:39:22.727000 audit[4377]: USER_ACCT pid=4377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.728980 sshd[4377]: Accepted publickey for core from 10.0.0.1 port 42204 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:22.729616 sshd[4377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:22.728000 audit[4377]: CRED_ACQ pid=4377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.734231 kernel: audit: type=1101 audit(1746664762.727:1327): pid=4377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.734332 kernel: audit: type=1103 audit(1746664762.728:1328): pid=4377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.734361 kernel: audit: type=1006 audit(1746664762.728:1329): pid=4377 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 8 00:39:22.737011 kernel: audit: type=1300 audit(1746664762.728:1329): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3076f40 a2=3 a3=1 items=0 ppid=1 pid=4377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.728000 audit[4377]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3076f40 a2=3 a3=1 items=0 ppid=1 pid=4377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.739659 kernel: audit: type=1327 audit(1746664762.728:1329): proctitle=737368643A20636F7265205B707269765D May 8 00:39:22.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:22.739745 systemd[1]: Started cri-containerd-4da232ca04d85dec3b9d4d02bf7634ca5c0749b6edac5911a8d1a12cfc431fbb.scope. May 8 00:39:22.749044 systemd-logind[1212]: New session 10 of user core. May 8 00:39:22.749909 systemd[1]: Started session-10.scope. May 8 00:39:22.755000 audit[4377]: USER_START pid=4377 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.759629 kernel: audit: type=1105 audit(1746664762.755:1330): pid=4377 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.759000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.763613 kernel: audit: type=1103 audit(1746664762.759:1331): pid=4402 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4232 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.770709 kernel: audit: type=1400 audit(1746664762.763:1332): avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770762 kernel: audit: type=1300 audit(1746664762.763:1332): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4232 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613233326361303464383564656333623964346430326266373633 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.763000 audit: BPF prog-id=198 op=LOAD May 8 00:39:22.763000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4232 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613233326361303464383564656333623964346430326266373633 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.766000 audit: BPF prog-id=199 op=LOAD May 8 00:39:22.766000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4232 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613233326361303464383564656333623964346430326266373633 May 8 00:39:22.770000 audit: BPF prog-id=199 op=UNLOAD May 8 00:39:22.770000 audit: BPF prog-id=198 op=UNLOAD May 8 00:39:22.770000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:22.770000 audit: BPF prog-id=200 op=LOAD May 8 00:39:22.770000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4232 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613233326361303464383564656333623964346430326266373633 May 8 00:39:22.791607 env[1220]: time="2025-05-08T00:39:22.791548006Z" level=info msg="StartContainer for \"4da232ca04d85dec3b9d4d02bf7634ca5c0749b6edac5911a8d1a12cfc431fbb\" returns successfully" May 8 00:39:22.830723 systemd-networkd[1045]: calie0736efc027: Gained IPv6LL May 8 00:39:22.894748 systemd-networkd[1045]: calie61d1162772: Gained IPv6LL May 8 00:39:22.913938 sshd[4377]: pam_unix(sshd:session): session closed for user core May 8 00:39:22.915000 audit[4377]: USER_END pid=4377 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.916000 audit[4377]: CRED_DISP pid=4377 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.917422 systemd[1]: Started sshd@10-10.0.0.58:22-10.0.0.1:42208.service. May 8 00:39:22.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.58:22-10.0.0.1:42208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:22.919173 systemd-logind[1212]: Session 10 logged out. Waiting for processes to exit. May 8 00:39:22.919328 systemd[1]: sshd@9-10.0.0.58:22-10.0.0.1:42204.service: Deactivated successfully. May 8 00:39:22.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:22.920189 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:39:22.920906 systemd-logind[1212]: Removed session 10. May 8 00:39:22.960000 audit[4423]: USER_ACCT pid=4423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.960881 sshd[4423]: Accepted publickey for core from 10.0.0.1 port 42208 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:22.961000 audit[4423]: CRED_ACQ pid=4423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.961000 audit[4423]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff25dd9c0 a2=3 a3=1 items=0 ppid=1 pid=4423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:22.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:22.962069 sshd[4423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:22.966001 systemd-logind[1212]: New session 11 of user core. May 8 00:39:22.966424 systemd[1]: Started session-11.scope. May 8 00:39:22.969000 audit[4423]: USER_START pid=4423 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:22.971000 audit[4426]: CRED_ACQ pid=4426 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.040802 kubelet[1954]: E0508 00:39:23.040758 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:23.041342 kubelet[1954]: E0508 00:39:23.041316 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:23.064000 audit[4435]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:23.064000 audit[4435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffdd75f10 a2=0 a3=1 items=0 ppid=2099 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:23.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:23.079000 audit[4435]: NETFILTER_CFG table=nat:115 family=2 entries=58 op=nft_register_chain pid=4435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:23.079000 audit[4435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=fffffdd75f10 a2=0 a3=1 items=0 ppid=2099 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:23.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:23.128514 sshd[4423]: pam_unix(sshd:session): session closed for user core May 8 00:39:23.130205 systemd[1]: Started sshd@11-10.0.0.58:22-10.0.0.1:42210.service. May 8 00:39:23.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.58:22-10.0.0.1:42210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:23.131000 audit[4423]: USER_END pid=4423 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.131000 audit[4423]: CRED_DISP pid=4423 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.58:22-10.0.0.1:42208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:23.142908 systemd[1]: sshd@10-10.0.0.58:22-10.0.0.1:42208.service: Deactivated successfully. May 8 00:39:23.143697 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:39:23.144557 systemd-logind[1212]: Session 11 logged out. Waiting for processes to exit. May 8 00:39:23.149994 systemd-logind[1212]: Removed session 11. May 8 00:39:23.179000 audit[4438]: USER_ACCT pid=4438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.180167 sshd[4438]: Accepted publickey for core from 10.0.0.1 port 42210 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:23.180000 audit[4438]: CRED_ACQ pid=4438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.180000 audit[4438]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc734ff80 a2=3 a3=1 items=0 ppid=1 pid=4438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:23.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:23.181380 sshd[4438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:23.185521 systemd[1]: Started session-12.scope. May 8 00:39:23.185797 systemd-logind[1212]: New session 12 of user core. May 8 00:39:23.189000 audit[4438]: USER_START pid=4438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.191000 audit[4441]: CRED_ACQ pid=4441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.214698 systemd-networkd[1045]: cali95851f539b7: Gained IPv6LL May 8 00:39:23.310619 sshd[4438]: pam_unix(sshd:session): session closed for user core May 8 00:39:23.310000 audit[4438]: USER_END pid=4438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.310000 audit[4438]: CRED_DISP pid=4438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:23.312965 systemd[1]: sshd@11-10.0.0.58:22-10.0.0.1:42210.service: Deactivated successfully. May 8 00:39:23.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.58:22-10.0.0.1:42210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:23.313744 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:39:23.314236 systemd-logind[1212]: Session 12 logged out. Waiting for processes to exit. May 8 00:39:23.314966 systemd-logind[1212]: Removed session 12. May 8 00:39:24.042635 kubelet[1954]: E0508 00:39:24.042557 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:24.598924 env[1220]: time="2025-05-08T00:39:24.598868486Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:24.601765 env[1220]: time="2025-05-08T00:39:24.601725767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:24.603552 env[1220]: time="2025-05-08T00:39:24.603520647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:24.605242 env[1220]: time="2025-05-08T00:39:24.605213488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:24.606245 env[1220]: time="2025-05-08T00:39:24.605762608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 8 00:39:24.607461 env[1220]: time="2025-05-08T00:39:24.607427048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:39:24.639150 env[1220]: time="2025-05-08T00:39:24.639101336Z" level=info msg="CreateContainer within sandbox \"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:39:24.655352 env[1220]: time="2025-05-08T00:39:24.655302859Z" level=info msg="CreateContainer within sandbox \"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68\"" May 8 00:39:24.655945 env[1220]: time="2025-05-08T00:39:24.655905579Z" level=info msg="StartContainer for \"ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68\"" May 8 00:39:24.676363 systemd[1]: Started cri-containerd-ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68.scope. May 8 00:39:24.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit: BPF prog-id=201 op=LOAD May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4314 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376161636536623061633561633831616638666539633566636337 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4314 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376161636536623061633561633831616638666539633566636337 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit: BPF prog-id=202 op=LOAD May 8 00:39:24.698000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4314 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376161636536623061633561633831616638666539633566636337 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit: BPF prog-id=203 op=LOAD May 8 00:39:24.698000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4314 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376161636536623061633561633831616638666539633566636337 May 8 00:39:24.698000 audit: BPF prog-id=203 op=UNLOAD May 8 00:39:24.698000 audit: BPF prog-id=202 op=UNLOAD May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:24.698000 audit: BPF prog-id=204 op=LOAD May 8 00:39:24.698000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4314 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376161636536623061633561633831616638666539633566636337 May 8 00:39:24.727043 env[1220]: time="2025-05-08T00:39:24.726989836Z" level=info msg="StartContainer for \"ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68\" returns successfully" May 8 00:39:25.047258 kubelet[1954]: E0508 00:39:25.047172 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:25.080461 kubelet[1954]: I0508 00:39:25.080033 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-59c8886cdc-h62qq" podStartSLOduration=25.163323578 podStartE2EDuration="28.080016876s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:39:21.69046863 +0000 UTC m=+37.874736653" lastFinishedPulling="2025-05-08 00:39:24.607161928 +0000 UTC m=+40.791429951" observedRunningTime="2025-05-08 00:39:25.079525596 +0000 UTC m=+41.263793619" watchObservedRunningTime="2025-05-08 00:39:25.080016876 +0000 UTC m=+41.264284899" May 8 00:39:25.962435 env[1220]: time="2025-05-08T00:39:25.962393028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.963879 env[1220]: time="2025-05-08T00:39:25.963848068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.965172 env[1220]: time="2025-05-08T00:39:25.965149189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.966688 env[1220]: time="2025-05-08T00:39:25.966649389Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:39:25.967207 env[1220]: time="2025-05-08T00:39:25.967169749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 8 00:39:25.969546 env[1220]: time="2025-05-08T00:39:25.969513349Z" level=info msg="CreateContainer within sandbox \"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:39:25.983763 env[1220]: time="2025-05-08T00:39:25.983708273Z" level=info msg="CreateContainer within sandbox \"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4faaccffdd07ffd74fd330d115b3f8d56f7194a6852b5cceba11b6b2f8fc9dbb\"" May 8 00:39:25.984308 env[1220]: time="2025-05-08T00:39:25.984174513Z" level=info msg="StartContainer for \"4faaccffdd07ffd74fd330d115b3f8d56f7194a6852b5cceba11b6b2f8fc9dbb\"" May 8 00:39:26.003221 systemd[1]: Started cri-containerd-4faaccffdd07ffd74fd330d115b3f8d56f7194a6852b5cceba11b6b2f8fc9dbb.scope. May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4232 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:26.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616163636666646430376666643734666433333064313135623366 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.035000 audit: BPF prog-id=205 op=LOAD May 8 00:39:26.035000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4232 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:26.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616163636666646430376666643734666433333064313135623366 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit: BPF prog-id=206 op=LOAD May 8 00:39:26.036000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4232 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:26.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616163636666646430376666643734666433333064313135623366 May 8 00:39:26.036000 audit: BPF prog-id=206 op=UNLOAD May 8 00:39:26.036000 audit: BPF prog-id=205 op=UNLOAD May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:39:26.036000 audit: BPF prog-id=207 op=LOAD May 8 00:39:26.036000 audit[4508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4232 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:26.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616163636666646430376666643734666433333064313135623366 May 8 00:39:26.085297 env[1220]: time="2025-05-08T00:39:26.085238573Z" level=info msg="StartContainer for \"4faaccffdd07ffd74fd330d115b3f8d56f7194a6852b5cceba11b6b2f8fc9dbb\" returns successfully" May 8 00:39:26.631064 systemd[1]: run-containerd-runc-k8s.io-4faaccffdd07ffd74fd330d115b3f8d56f7194a6852b5cceba11b6b2f8fc9dbb-runc.UuxzyP.mount: Deactivated successfully. May 8 00:39:26.972063 kubelet[1954]: I0508 00:39:26.972028 1954 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:39:26.972488 kubelet[1954]: I0508 00:39:26.972473 1954 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:39:27.101499 kubelet[1954]: I0508 00:39:27.101432 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-zl96g" podStartSLOduration=25.721100752 podStartE2EDuration="30.101413859s" podCreationTimestamp="2025-05-08 00:38:57 +0000 UTC" firstStartedPulling="2025-05-08 00:39:21.587868802 +0000 UTC m=+37.772136825" lastFinishedPulling="2025-05-08 00:39:25.968181909 +0000 UTC m=+42.152449932" observedRunningTime="2025-05-08 00:39:27.101246699 +0000 UTC m=+43.285514722" watchObservedRunningTime="2025-05-08 00:39:27.101413859 +0000 UTC m=+43.285681882" May 8 00:39:28.315609 systemd[1]: Started sshd@12-10.0.0.58:22-10.0.0.1:42224.service. May 8 00:39:28.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.58:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:28.316908 kernel: kauditd_printk_skb: 172 callbacks suppressed May 8 00:39:28.316961 kernel: audit: type=1130 audit(1746664768.315:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.58:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:28.363000 audit[4563]: USER_ACCT pid=4563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.363934 sshd[4563]: Accepted publickey for core from 10.0.0.1 port 42224 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:28.365637 sshd[4563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:28.364000 audit[4563]: CRED_ACQ pid=4563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.370330 kernel: audit: type=1101 audit(1746664768.363:1386): pid=4563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.370390 kernel: audit: type=1103 audit(1746664768.364:1387): pid=4563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.370414 kernel: audit: type=1006 audit(1746664768.364:1388): pid=4563 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 8 00:39:28.369526 systemd-logind[1212]: New session 13 of user core. May 8 00:39:28.370007 systemd[1]: Started session-13.scope. May 8 00:39:28.364000 audit[4563]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0573f00 a2=3 a3=1 items=0 ppid=1 pid=4563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:28.375977 kernel: audit: type=1300 audit(1746664768.364:1388): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0573f00 a2=3 a3=1 items=0 ppid=1 pid=4563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:28.376030 kernel: audit: type=1327 audit(1746664768.364:1388): proctitle=737368643A20636F7265205B707269765D May 8 00:39:28.364000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:28.373000 audit[4563]: USER_START pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.380272 kernel: audit: type=1105 audit(1746664768.373:1389): pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.374000 audit[4565]: CRED_ACQ pid=4565 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.383602 kernel: audit: type=1103 audit(1746664768.374:1390): pid=4565 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.546899 sshd[4563]: pam_unix(sshd:session): session closed for user core May 8 00:39:28.547000 audit[4563]: USER_END pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.550374 systemd[1]: sshd@12-10.0.0.58:22-10.0.0.1:42224.service: Deactivated successfully. May 8 00:39:28.551350 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:39:28.547000 audit[4563]: CRED_DISP pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.552234 systemd-logind[1212]: Session 13 logged out. Waiting for processes to exit. May 8 00:39:28.553068 systemd-logind[1212]: Removed session 13. May 8 00:39:28.555061 kernel: audit: type=1106 audit(1746664768.547:1391): pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.555108 kernel: audit: type=1104 audit(1746664768.547:1392): pid=4563 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:28.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.58:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:33.550795 systemd[1]: Started sshd@13-10.0.0.58:22-10.0.0.1:33298.service. May 8 00:39:33.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:33.551813 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:39:33.551863 kernel: audit: type=1130 audit(1746664773.550:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:33.592000 audit[4584]: USER_ACCT pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.593317 sshd[4584]: Accepted publickey for core from 10.0.0.1 port 33298 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:33.595074 sshd[4584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:33.594000 audit[4584]: CRED_ACQ pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.598998 systemd-logind[1212]: New session 14 of user core. May 8 00:39:33.599534 kernel: audit: type=1101 audit(1746664773.592:1395): pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.599567 kernel: audit: type=1103 audit(1746664773.594:1396): pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.599589 kernel: audit: type=1006 audit(1746664773.594:1397): pid=4584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 8 00:39:33.599476 systemd[1]: Started session-14.scope. May 8 00:39:33.594000 audit[4584]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7567340 a2=3 a3=1 items=0 ppid=1 pid=4584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:33.604558 kernel: audit: type=1300 audit(1746664773.594:1397): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7567340 a2=3 a3=1 items=0 ppid=1 pid=4584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:33.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:33.605903 kernel: audit: type=1327 audit(1746664773.594:1397): proctitle=737368643A20636F7265205B707269765D May 8 00:39:33.605954 kernel: audit: type=1105 audit(1746664773.604:1398): pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.604000 audit[4584]: USER_START pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.611749 kernel: audit: type=1103 audit(1746664773.606:1399): pid=4586 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.606000 audit[4586]: CRED_ACQ pid=4586 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.728976 sshd[4584]: pam_unix(sshd:session): session closed for user core May 8 00:39:33.729000 audit[4584]: USER_END pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.731924 systemd[1]: sshd@13-10.0.0.58:22-10.0.0.1:33298.service: Deactivated successfully. May 8 00:39:33.732785 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:39:33.733320 systemd-logind[1212]: Session 14 logged out. Waiting for processes to exit. May 8 00:39:33.733651 kernel: audit: type=1106 audit(1746664773.729:1400): pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.733691 kernel: audit: type=1104 audit(1746664773.729:1401): pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.729000 audit[4584]: CRED_DISP pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:33.734238 systemd-logind[1212]: Removed session 14. May 8 00:39:33.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:38.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:33312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:38.735026 systemd[1]: Started sshd@14-10.0.0.58:22-10.0.0.1:33312.service. May 8 00:39:38.736002 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:39:38.736035 kernel: audit: type=1130 audit(1746664778.734:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:33312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:38.778000 audit[4604]: USER_ACCT pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.779193 sshd[4604]: Accepted publickey for core from 10.0.0.1 port 33312 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:38.780776 sshd[4604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:38.779000 audit[4604]: CRED_ACQ pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.785703 kernel: audit: type=1101 audit(1746664778.778:1404): pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.785755 kernel: audit: type=1103 audit(1746664778.779:1405): pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.785776 kernel: audit: type=1006 audit(1746664778.779:1406): pid=4604 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 8 00:39:38.788398 kernel: audit: type=1300 audit(1746664778.779:1406): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeca0a9a0 a2=3 a3=1 items=0 ppid=1 pid=4604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:38.779000 audit[4604]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeca0a9a0 a2=3 a3=1 items=0 ppid=1 pid=4604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:38.789665 systemd[1]: Started session-15.scope. May 8 00:39:38.790212 systemd-logind[1212]: New session 15 of user core. May 8 00:39:38.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:38.791930 kernel: audit: type=1327 audit(1746664778.779:1406): proctitle=737368643A20636F7265205B707269765D May 8 00:39:38.793000 audit[4604]: USER_START pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.794000 audit[4606]: CRED_ACQ pid=4606 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.800803 kernel: audit: type=1105 audit(1746664778.793:1407): pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.800869 kernel: audit: type=1103 audit(1746664778.794:1408): pid=4606 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.918686 sshd[4604]: pam_unix(sshd:session): session closed for user core May 8 00:39:38.918000 audit[4604]: USER_END pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.918000 audit[4604]: CRED_DISP pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.925936 kernel: audit: type=1106 audit(1746664778.918:1409): pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.926182 kernel: audit: type=1104 audit(1746664778.918:1410): pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:38.927961 systemd[1]: sshd@14-10.0.0.58:22-10.0.0.1:33312.service: Deactivated successfully. May 8 00:39:38.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:33312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:38.928742 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:39:38.929216 systemd-logind[1212]: Session 15 logged out. Waiting for processes to exit. May 8 00:39:38.929822 systemd-logind[1212]: Removed session 15. May 8 00:39:41.080000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.080000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.080000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400fcef9b0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.080000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400ff16fc0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.087000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.087000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400fedd0a0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.087000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.089000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.089000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=40100017a0 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.089000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.089000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=401011a840 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.093000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.093000 audit[1836]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4010001800 a2=fc6 a3=0 items=0 ppid=1672 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c532 key=(null) May 8 00:39:41.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:39:41.826007 kubelet[1954]: I0508 00:39:41.825961 1954 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:39:41.826000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.826000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400325a4c0 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:41.826000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:41.826000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:41.826000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002f45d40 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:41.826000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:41.860000 audit[4620]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4620 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:41.860000 audit[4620]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe6138030 a2=0 a3=1 items=0 ppid=2099 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:41.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:41.869000 audit[4620]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4620 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:41.869000 audit[4620]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe6138030 a2=0 a3=1 items=0 ppid=2099 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:41.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:43.898655 env[1220]: time="2025-05-08T00:39:43.898612546Z" level=info msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" May 8 00:39:43.924037 systemd[1]: Started sshd@15-10.0.0.58:22-10.0.0.1:51700.service. May 8 00:39:43.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:43.925013 kernel: kauditd_printk_skb: 31 callbacks suppressed May 8 00:39:43.925097 kernel: audit: type=1130 audit(1746664783.923:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:43.986000 audit[4646]: USER_ACCT pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:43.989013 sshd[4646]: Accepted publickey for core from 10.0.0.1 port 51700 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:43.989000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.946 [WARNING][4637] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0", GenerateName:"calico-kube-controllers-59c8886cdc-", Namespace:"calico-system", SelfLink:"", UID:"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59c8886cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63", Pod:"calico-kube-controllers-59c8886cdc-h62qq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali95851f539b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.947 [INFO][4637] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.947 [INFO][4637] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" iface="eth0" netns="" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.947 [INFO][4637] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.947 [INFO][4637] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.971 [INFO][4649] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.971 [INFO][4649] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.971 [INFO][4649] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.981 [WARNING][4649] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.981 [INFO][4649] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.984 [INFO][4649] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:43.990476 env[1220]: 2025-05-08 00:39:43.985 [INFO][4637] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:43.991055 sshd[4646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:43.991580 env[1220]: time="2025-05-08T00:39:43.990117032Z" level=info msg="TearDown network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" successfully" May 8 00:39:43.991779 env[1220]: time="2025-05-08T00:39:43.991753432Z" level=info msg="StopPodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" returns successfully" May 8 00:39:43.992890 env[1220]: time="2025-05-08T00:39:43.992863232Z" level=info msg="RemovePodSandbox for \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" May 8 00:39:43.993066 env[1220]: time="2025-05-08T00:39:43.993015952Z" level=info msg="Forcibly stopping sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\"" May 8 00:39:43.993148 kernel: audit: type=1101 audit(1746664783.986:1423): pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:43.993216 kernel: audit: type=1103 audit(1746664783.989:1424): pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:43.993728 kernel: audit: type=1006 audit(1746664783.989:1425): pid=4646 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 8 00:39:43.989000 audit[4646]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde8d8ae0 a2=3 a3=1 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.995698 systemd-logind[1212]: New session 16 of user core. May 8 00:39:43.996069 systemd[1]: Started session-16.scope. May 8 00:39:43.998422 kernel: audit: type=1300 audit(1746664783.989:1425): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde8d8ae0 a2=3 a3=1 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:43.998502 kernel: audit: type=1327 audit(1746664783.989:1425): proctitle=737368643A20636F7265205B707269765D May 8 00:39:43.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:44.002000 audit[4646]: USER_START pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.002000 audit[4671]: CRED_ACQ pid=4671 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.009412 kernel: audit: type=1105 audit(1746664784.002:1426): pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.009496 kernel: audit: type=1103 audit(1746664784.002:1427): pid=4671 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.019836 systemd[1]: run-containerd-runc-k8s.io-e84ee3b5bbfd4ad622f71dab304e14614f014f73be049486750968bfc1de53e6-runc.2H4e8p.mount: Deactivated successfully. May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.049 [WARNING][4686] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0", GenerateName:"calico-kube-controllers-59c8886cdc-", Namespace:"calico-system", SelfLink:"", UID:"67da260b-a9cf-4fc5-a3e9-4921c1fb24d8", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59c8886cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7bfbba7fcceb132318c3762150edf782e1684d9969a58f01d2463cc42e272a63", Pod:"calico-kube-controllers-59c8886cdc-h62qq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali95851f539b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.050 [INFO][4686] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.050 [INFO][4686] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" iface="eth0" netns="" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.050 [INFO][4686] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.050 [INFO][4686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.077 [INFO][4703] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.077 [INFO][4703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.077 [INFO][4703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.087 [WARNING][4703] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.087 [INFO][4703] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" HandleID="k8s-pod-network.2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" Workload="localhost-k8s-calico--kube--controllers--59c8886cdc--h62qq-eth0" May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.089 [INFO][4703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.092948 env[1220]: 2025-05-08 00:39:44.090 [INFO][4686] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5" May 8 00:39:44.092948 env[1220]: time="2025-05-08T00:39:44.092672718Z" level=info msg="TearDown network for sandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" successfully" May 8 00:39:44.100790 env[1220]: time="2025-05-08T00:39:44.100744479Z" level=info msg="RemovePodSandbox \"2b51e6acbb109fcfb3de8f24dcd37b4f9eebb432b2cb3b4cf41ff838c2c328d5\" returns successfully" May 8 00:39:44.101384 env[1220]: time="2025-05-08T00:39:44.101353959Z" level=info msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" May 8 00:39:44.109327 kubelet[1954]: E0508 00:39:44.109284 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.166 [WARNING][4740] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--zl96g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3d376fe-5d96-47d8-8530-176f83a0cb2e", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1", Pod:"csi-node-driver-zl96g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie0736efc027", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.166 [INFO][4740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.166 [INFO][4740] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" iface="eth0" netns="" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.166 [INFO][4740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.166 [INFO][4740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.192 [INFO][4749] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.192 [INFO][4749] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.192 [INFO][4749] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.202 [WARNING][4749] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.202 [INFO][4749] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.203 [INFO][4749] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.206569 env[1220]: 2025-05-08 00:39:44.205 [INFO][4740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.206569 env[1220]: time="2025-05-08T00:39:44.206534646Z" level=info msg="TearDown network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" successfully" May 8 00:39:44.206569 env[1220]: time="2025-05-08T00:39:44.206566606Z" level=info msg="StopPodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" returns successfully" May 8 00:39:44.207617 env[1220]: time="2025-05-08T00:39:44.207545846Z" level=info msg="RemovePodSandbox for \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" May 8 00:39:44.207714 env[1220]: time="2025-05-08T00:39:44.207669486Z" level=info msg="Forcibly stopping sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\"" May 8 00:39:44.219137 sshd[4646]: pam_unix(sshd:session): session closed for user core May 8 00:39:44.221000 audit[4646]: USER_END pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.222574 systemd[1]: Started sshd@16-10.0.0.58:22-10.0.0.1:51702.service. May 8 00:39:44.223059 systemd[1]: sshd@15-10.0.0.58:22-10.0.0.1:51700.service: Deactivated successfully. May 8 00:39:44.223827 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:39:44.221000 audit[4646]: CRED_DISP pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.226658 systemd-logind[1212]: Session 16 logged out. Waiting for processes to exit. May 8 00:39:44.227726 systemd-logind[1212]: Removed session 16. May 8 00:39:44.228341 kernel: audit: type=1106 audit(1746664784.221:1428): pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.228416 kernel: audit: type=1104 audit(1746664784.221:1429): pid=4646 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.58:22-10.0.0.1:51702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:44.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:44.266000 audit[4780]: USER_ACCT pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.267643 sshd[4780]: Accepted publickey for core from 10.0.0.1 port 51702 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:44.268000 audit[4780]: CRED_ACQ pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.268000 audit[4780]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1478900 a2=3 a3=1 items=0 ppid=1 pid=4780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:44.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:44.269073 sshd[4780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:44.273108 systemd-logind[1212]: New session 17 of user core. May 8 00:39:44.273562 systemd[1]: Started session-17.scope. May 8 00:39:44.277000 audit[4780]: USER_START pid=4780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.278000 audit[4793]: CRED_ACQ pid=4793 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.258 [WARNING][4774] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--zl96g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3d376fe-5d96-47d8-8530-176f83a0cb2e", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"806c3bfd41235e43d6f930b21821bddce43c6a06c59b3ec78dff28f8c4f9e0e1", Pod:"csi-node-driver-zl96g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie0736efc027", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.259 [INFO][4774] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.259 [INFO][4774] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" iface="eth0" netns="" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.259 [INFO][4774] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.259 [INFO][4774] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.284 [INFO][4787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.284 [INFO][4787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.284 [INFO][4787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.293 [WARNING][4787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.293 [INFO][4787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" HandleID="k8s-pod-network.aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" Workload="localhost-k8s-csi--node--driver--zl96g-eth0" May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.295 [INFO][4787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.299106 env[1220]: 2025-05-08 00:39:44.297 [INFO][4774] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600" May 8 00:39:44.299701 env[1220]: time="2025-05-08T00:39:44.299123052Z" level=info msg="TearDown network for sandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" successfully" May 8 00:39:44.301897 env[1220]: time="2025-05-08T00:39:44.301862252Z" level=info msg="RemovePodSandbox \"aac1860bcc051db9576ebf8436918793484e5f6307fc4dfa24f0a77902895600\" returns successfully" May 8 00:39:44.302353 env[1220]: time="2025-05-08T00:39:44.302329852Z" level=info msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.338 [WARNING][4810] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0879df54-64ba-4699-9a0f-25d5ec902580", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487", Pod:"coredns-668d6bf9bc-6wnc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie61d1162772", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.338 [INFO][4810] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.338 [INFO][4810] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" iface="eth0" netns="" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.338 [INFO][4810] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.338 [INFO][4810] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.363 [INFO][4820] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.363 [INFO][4820] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.363 [INFO][4820] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.372 [WARNING][4820] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.372 [INFO][4820] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.376 [INFO][4820] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.380038 env[1220]: 2025-05-08 00:39:44.377 [INFO][4810] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.380631 env[1220]: time="2025-05-08T00:39:44.380070337Z" level=info msg="TearDown network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" successfully" May 8 00:39:44.380631 env[1220]: time="2025-05-08T00:39:44.380105777Z" level=info msg="StopPodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" returns successfully" May 8 00:39:44.380780 env[1220]: time="2025-05-08T00:39:44.380729297Z" level=info msg="RemovePodSandbox for \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" May 8 00:39:44.380821 env[1220]: time="2025-05-08T00:39:44.380766177Z" level=info msg="Forcibly stopping sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\"" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.425 [WARNING][4848] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0879df54-64ba-4699-9a0f-25d5ec902580", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"109cea83c5c5bed087f6fe86e02cb25a5088ec943b61331244bf2fb3a780b487", Pod:"coredns-668d6bf9bc-6wnc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie61d1162772", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.425 [INFO][4848] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.425 [INFO][4848] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" iface="eth0" netns="" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.425 [INFO][4848] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.425 [INFO][4848] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.445 [INFO][4859] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.445 [INFO][4859] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.446 [INFO][4859] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.455 [WARNING][4859] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.455 [INFO][4859] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" HandleID="k8s-pod-network.19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" Workload="localhost-k8s-coredns--668d6bf9bc--6wnc5-eth0" May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.457 [INFO][4859] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.462497 env[1220]: 2025-05-08 00:39:44.460 [INFO][4848] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408" May 8 00:39:44.462497 env[1220]: time="2025-05-08T00:39:44.462476862Z" level=info msg="TearDown network for sandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" successfully" May 8 00:39:44.471161 env[1220]: time="2025-05-08T00:39:44.471090823Z" level=info msg="RemovePodSandbox \"19d4f8b21a5b037e5195a3c275193d968df63ec4d7d9bc6356b8a3ce54427408\" returns successfully" May 8 00:39:44.472093 env[1220]: time="2025-05-08T00:39:44.472036343Z" level=info msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" May 8 00:39:44.530873 sshd[4780]: pam_unix(sshd:session): session closed for user core May 8 00:39:44.532000 audit[4780]: USER_END pid=4780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.532000 audit[4780]: CRED_DISP pid=4780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.58:22-10.0.0.1:51706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:44.535042 systemd[1]: Started sshd@17-10.0.0.58:22-10.0.0.1:51706.service. May 8 00:39:44.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.58:22-10.0.0.1:51702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:44.538271 systemd[1]: sshd@16-10.0.0.58:22-10.0.0.1:51702.service: Deactivated successfully. May 8 00:39:44.538973 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:39:44.539613 systemd-logind[1212]: Session 17 logged out. Waiting for processes to exit. May 8 00:39:44.540531 systemd-logind[1212]: Removed session 17. May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.517 [WARNING][4881] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d63149e1-4d91-4b94-acb3-5421d218b97f", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055", Pod:"calico-apiserver-674b4d589-9lffc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62dbd65115e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.517 [INFO][4881] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.517 [INFO][4881] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" iface="eth0" netns="" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.517 [INFO][4881] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.517 [INFO][4881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.546 [INFO][4889] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.546 [INFO][4889] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.546 [INFO][4889] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.555 [WARNING][4889] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.555 [INFO][4889] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.557 [INFO][4889] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.561560 env[1220]: 2025-05-08 00:39:44.559 [INFO][4881] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.562055 env[1220]: time="2025-05-08T00:39:44.562020788Z" level=info msg="TearDown network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" successfully" May 8 00:39:44.562120 env[1220]: time="2025-05-08T00:39:44.562103588Z" level=info msg="StopPodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" returns successfully" May 8 00:39:44.562670 env[1220]: time="2025-05-08T00:39:44.562643428Z" level=info msg="RemovePodSandbox for \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" May 8 00:39:44.562743 env[1220]: time="2025-05-08T00:39:44.562697628Z" level=info msg="Forcibly stopping sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\"" May 8 00:39:44.583000 audit[4896]: USER_ACCT pid=4896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.584009 sshd[4896]: Accepted publickey for core from 10.0.0.1 port 51706 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:44.584000 audit[4896]: CRED_ACQ pid=4896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.584000 audit[4896]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb356ec0 a2=3 a3=1 items=0 ppid=1 pid=4896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:44.584000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:44.585280 sshd[4896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:44.588972 systemd-logind[1212]: New session 18 of user core. May 8 00:39:44.589779 systemd[1]: Started session-18.scope. May 8 00:39:44.597000 audit[4896]: USER_START pid=4896 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.598000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.603 [WARNING][4915] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d63149e1-4d91-4b94-acb3-5421d218b97f", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3ef801e879e961c472b19af13cd5c7477b57b2e810fd429e58faed34f64fc055", Pod:"calico-apiserver-674b4d589-9lffc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62dbd65115e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.603 [INFO][4915] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.603 [INFO][4915] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" iface="eth0" netns="" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.603 [INFO][4915] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.603 [INFO][4915] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.627 [INFO][4924] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.627 [INFO][4924] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.628 [INFO][4924] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.638 [WARNING][4924] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.638 [INFO][4924] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" HandleID="k8s-pod-network.057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" Workload="localhost-k8s-calico--apiserver--674b4d589--9lffc-eth0" May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.640 [INFO][4924] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.643890 env[1220]: 2025-05-08 00:39:44.642 [INFO][4915] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02" May 8 00:39:44.644538 env[1220]: time="2025-05-08T00:39:44.643893554Z" level=info msg="TearDown network for sandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" successfully" May 8 00:39:44.647293 env[1220]: time="2025-05-08T00:39:44.647254354Z" level=info msg="RemovePodSandbox \"057019dd540fd7a628c6122e225556ea5bc7aa4a0db716df8db745e3007c1c02\" returns successfully" May 8 00:39:44.647781 env[1220]: time="2025-05-08T00:39:44.647752234Z" level=info msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.683 [WARNING][4954] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"df47b00b-4cf5-4427-b2b6-3e05198eeb27", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d", Pod:"calico-apiserver-674b4d589-ql6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia59de4c54b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.684 [INFO][4954] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.684 [INFO][4954] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" iface="eth0" netns="" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.684 [INFO][4954] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.684 [INFO][4954] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.706 [INFO][4965] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.706 [INFO][4965] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.706 [INFO][4965] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.716 [WARNING][4965] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.716 [INFO][4965] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.717 [INFO][4965] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.722923 env[1220]: 2025-05-08 00:39:44.719 [INFO][4954] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.722923 env[1220]: time="2025-05-08T00:39:44.721086039Z" level=info msg="TearDown network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" successfully" May 8 00:39:44.722923 env[1220]: time="2025-05-08T00:39:44.721117479Z" level=info msg="StopPodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" returns successfully" May 8 00:39:44.724154 env[1220]: time="2025-05-08T00:39:44.724129199Z" level=info msg="RemovePodSandbox for \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" May 8 00:39:44.724325 env[1220]: time="2025-05-08T00:39:44.724282959Z" level=info msg="Forcibly stopping sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\"" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.762 [WARNING][4988] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0", GenerateName:"calico-apiserver-674b4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"df47b00b-4cf5-4427-b2b6-3e05198eeb27", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"674b4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d81027b11abe191a4500f91d98790372df4a7d0aa7bad5cbecb4c8d1b6282e6d", Pod:"calico-apiserver-674b4d589-ql6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia59de4c54b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.762 [INFO][4988] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.762 [INFO][4988] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" iface="eth0" netns="" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.762 [INFO][4988] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.762 [INFO][4988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.782 [INFO][4996] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.782 [INFO][4996] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.782 [INFO][4996] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.794 [WARNING][4996] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.794 [INFO][4996] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" HandleID="k8s-pod-network.1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" Workload="localhost-k8s-calico--apiserver--674b4d589--ql6mv-eth0" May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.795 [INFO][4996] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.798717 env[1220]: 2025-05-08 00:39:44.797 [INFO][4988] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f" May 8 00:39:44.799127 env[1220]: time="2025-05-08T00:39:44.798737883Z" level=info msg="TearDown network for sandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" successfully" May 8 00:39:44.801998 env[1220]: time="2025-05-08T00:39:44.801959604Z" level=info msg="RemovePodSandbox \"1901b245da4a0eb34e0145541872864ace4fbebd549604c6d58e48e9804c5f3f\" returns successfully" May 8 00:39:44.802479 env[1220]: time="2025-05-08T00:39:44.802446364Z" level=info msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.836 [WARNING][5018] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--t66vb-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"beed0031-63b3-43c1-a16a-bff4ae2fb2f9", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953", Pod:"coredns-668d6bf9bc-t66vb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5d1fa9cf8f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.836 [INFO][5018] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.836 [INFO][5018] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" iface="eth0" netns="" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.837 [INFO][5018] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.837 [INFO][5018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.861 [INFO][5026] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.861 [INFO][5026] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.861 [INFO][5026] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.870 [WARNING][5026] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.870 [INFO][5026] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.871 [INFO][5026] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.875876 env[1220]: 2025-05-08 00:39:44.874 [INFO][5018] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.876328 env[1220]: time="2025-05-08T00:39:44.875897648Z" level=info msg="TearDown network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" successfully" May 8 00:39:44.876328 env[1220]: time="2025-05-08T00:39:44.875925728Z" level=info msg="StopPodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" returns successfully" May 8 00:39:44.876759 env[1220]: time="2025-05-08T00:39:44.876706048Z" level=info msg="RemovePodSandbox for \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" May 8 00:39:44.876759 env[1220]: time="2025-05-08T00:39:44.876739248Z" level=info msg="Forcibly stopping sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\"" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.910 [WARNING][5049] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--t66vb-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"beed0031-63b3-43c1-a16a-bff4ae2fb2f9", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7adcaca2798f14b264b3f073d455f86e1162ade37dbba8de4437014317a20953", Pod:"coredns-668d6bf9bc-t66vb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5d1fa9cf8f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.910 [INFO][5049] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.910 [INFO][5049] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" iface="eth0" netns="" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.910 [INFO][5049] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.910 [INFO][5049] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.932 [INFO][5057] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.932 [INFO][5057] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.932 [INFO][5057] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.940 [WARNING][5057] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.940 [INFO][5057] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" HandleID="k8s-pod-network.b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" Workload="localhost-k8s-coredns--668d6bf9bc--t66vb-eth0" May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.942 [INFO][5057] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:39:44.945693 env[1220]: 2025-05-08 00:39:44.944 [INFO][5049] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a" May 8 00:39:44.946405 env[1220]: time="2025-05-08T00:39:44.946371253Z" level=info msg="TearDown network for sandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" successfully" May 8 00:39:44.949360 env[1220]: time="2025-05-08T00:39:44.949331133Z" level=info msg="RemovePodSandbox \"b1c15b8c19ffd88b966b2992866d087943355bd484f122259637dff7ae0b8d7a\" returns successfully" May 8 00:39:45.433000 audit[5069]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:45.433000 audit[5069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffded22620 a2=0 a3=1 items=0 ppid=2099 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:45.438000 audit[5069]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:45.438000 audit[5069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffded22620 a2=0 a3=1 items=0 ppid=2099 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:45.442893 sshd[4896]: pam_unix(sshd:session): session closed for user core May 8 00:39:45.443000 audit[4896]: USER_END pid=4896 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.443000 audit[4896]: CRED_DISP pid=4896 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.446356 systemd[1]: sshd@17-10.0.0.58:22-10.0.0.1:51706.service: Deactivated successfully. May 8 00:39:45.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.58:22-10.0.0.1:51706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:45.447263 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:39:45.448915 systemd-logind[1212]: Session 18 logged out. Waiting for processes to exit. May 8 00:39:45.450099 systemd[1]: Started sshd@18-10.0.0.58:22-10.0.0.1:51716.service. May 8 00:39:45.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.58:22-10.0.0.1:51716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:45.450907 systemd-logind[1212]: Removed session 18. May 8 00:39:45.454000 audit[5074]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:45.454000 audit[5074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffeec37d90 a2=0 a3=1 items=0 ppid=2099 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:45.461000 audit[5074]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:45.461000 audit[5074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeec37d90 a2=0 a3=1 items=0 ppid=2099 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:45.492000 audit[5073]: USER_ACCT pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.493716 sshd[5073]: Accepted publickey for core from 10.0.0.1 port 51716 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:45.494000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.494000 audit[5073]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe34dde50 a2=3 a3=1 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:45.496986 sshd[5073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:45.502110 systemd[1]: Started session-19.scope. May 8 00:39:45.502528 systemd-logind[1212]: New session 19 of user core. May 8 00:39:45.508000 audit[5073]: USER_START pid=5073 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.509000 audit[5076]: CRED_ACQ pid=5076 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.778502 sshd[5073]: pam_unix(sshd:session): session closed for user core May 8 00:39:45.780000 audit[5073]: USER_END pid=5073 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.780000 audit[5073]: CRED_DISP pid=5073 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.783360 systemd[1]: Started sshd@19-10.0.0.58:22-10.0.0.1:51722.service. May 8 00:39:45.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.58:22-10.0.0.1:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:45.783984 systemd[1]: sshd@18-10.0.0.58:22-10.0.0.1:51716.service: Deactivated successfully. May 8 00:39:45.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.58:22-10.0.0.1:51716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:45.784848 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:39:45.786300 systemd-logind[1212]: Session 19 logged out. Waiting for processes to exit. May 8 00:39:45.791348 systemd-logind[1212]: Removed session 19. May 8 00:39:45.828000 audit[5084]: USER_ACCT pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.829843 sshd[5084]: Accepted publickey for core from 10.0.0.1 port 51722 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:45.830000 audit[5084]: CRED_ACQ pid=5084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.830000 audit[5084]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea3010d0 a2=3 a3=1 items=0 ppid=1 pid=5084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:45.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:45.831922 sshd[5084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:45.837465 systemd[1]: Started session-20.scope. May 8 00:39:45.838001 systemd-logind[1212]: New session 20 of user core. May 8 00:39:45.842000 audit[5084]: USER_START pid=5084 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.844000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.977813 sshd[5084]: pam_unix(sshd:session): session closed for user core May 8 00:39:45.978000 audit[5084]: USER_END pid=5084 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.978000 audit[5084]: CRED_DISP pid=5084 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:45.980589 systemd[1]: sshd@19-10.0.0.58:22-10.0.0.1:51722.service: Deactivated successfully. May 8 00:39:45.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.58:22-10.0.0.1:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:45.981370 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:39:45.981930 systemd-logind[1212]: Session 20 logged out. Waiting for processes to exit. May 8 00:39:45.982761 systemd-logind[1212]: Removed session 20. May 8 00:39:49.023454 systemd[1]: run-containerd-runc-k8s.io-ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68-runc.v4GIVo.mount: Deactivated successfully. May 8 00:39:50.394000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.396289 kernel: kauditd_printk_skb: 57 callbacks suppressed May 8 00:39:50.396371 kernel: audit: type=1400 audit(1746664790.394:1471): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.394000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b00 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.405258 kernel: audit: type=1300 audit(1746664790.394:1471): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b00 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.405345 kernel: audit: type=1327 audit(1746664790.394:1471): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.394000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.410324 kernel: audit: type=1400 audit(1746664790.394:1472): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.394000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b20 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.414607 kernel: audit: type=1300 audit(1746664790.394:1472): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b20 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.414688 kernel: audit: type=1327 audit(1746664790.394:1472): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.395000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.421504 kernel: audit: type=1400 audit(1746664790.395:1473): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.421566 kernel: audit: type=1300 audit(1746664790.395:1473): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b40 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.395000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b40 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.429173 kernel: audit: type=1327 audit(1746664790.395:1473): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.429247 kernel: audit: type=1400 audit(1746664790.395:1474): avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.395000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:39:50.395000 audit[1834]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae3b60 a2=fc6 a3=0 items=0 ppid=1673 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c513 key=(null) May 8 00:39:50.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:39:50.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.58:22-10.0.0.1:51724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:50.983076 systemd[1]: Started sshd@20-10.0.0.58:22-10.0.0.1:51724.service. May 8 00:39:51.029000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.030400 sshd[5120]: Accepted publickey for core from 10.0.0.1 port 51724 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:51.030000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.030000 audit[5120]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecc88760 a2=3 a3=1 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:51.031543 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:51.035209 systemd-logind[1212]: New session 21 of user core. May 8 00:39:51.036079 systemd[1]: Started session-21.scope. May 8 00:39:51.039000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.040000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.079000 audit[5124]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:51.079000 audit[5124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd9309520 a2=0 a3=1 items=0 ppid=2099 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:51.087000 audit[5124]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:39:51.087000 audit[5124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd9309520 a2=0 a3=1 items=0 ppid=2099 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:51.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:39:51.182017 sshd[5120]: pam_unix(sshd:session): session closed for user core May 8 00:39:51.182000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.182000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:51.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.58:22-10.0.0.1:51724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:51.184417 systemd[1]: sshd@20-10.0.0.58:22-10.0.0.1:51724.service: Deactivated successfully. May 8 00:39:51.185186 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:39:51.185968 systemd-logind[1212]: Session 21 logged out. Waiting for processes to exit. May 8 00:39:51.186769 systemd-logind[1212]: Removed session 21. May 8 00:39:56.107746 systemd[1]: run-containerd-runc-k8s.io-ea7aace6b0ac5ac81af8fe9c5fcc7ba39329f48cc03d05cfac2d1a46518acb68-runc.4jGQVx.mount: Deactivated successfully. May 8 00:39:56.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.58:22-10.0.0.1:42394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:56.187388 systemd[1]: Started sshd@21-10.0.0.58:22-10.0.0.1:42394.service. May 8 00:39:56.188389 kernel: kauditd_printk_skb: 19 callbacks suppressed May 8 00:39:56.188506 kernel: audit: type=1130 audit(1746664796.186:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.58:22-10.0.0.1:42394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:56.233000 audit[5157]: USER_ACCT pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.234304 sshd[5157]: Accepted publickey for core from 10.0.0.1 port 42394 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:39:56.236662 sshd[5157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:39:56.235000 audit[5157]: CRED_ACQ pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.241128 kernel: audit: type=1101 audit(1746664796.233:1487): pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.241204 kernel: audit: type=1103 audit(1746664796.235:1488): pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.241254 kernel: audit: type=1006 audit(1746664796.235:1489): pid=5157 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 8 00:39:56.241334 systemd-logind[1212]: New session 22 of user core. May 8 00:39:56.241626 systemd[1]: Started session-22.scope. May 8 00:39:56.242854 kernel: audit: type=1300 audit(1746664796.235:1489): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde99e150 a2=3 a3=1 items=0 ppid=1 pid=5157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:56.235000 audit[5157]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde99e150 a2=3 a3=1 items=0 ppid=1 pid=5157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:39:56.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:39:56.247105 kernel: audit: type=1327 audit(1746664796.235:1489): proctitle=737368643A20636F7265205B707269765D May 8 00:39:56.247177 kernel: audit: type=1105 audit(1746664796.246:1490): pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.246000 audit[5157]: USER_START pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.247000 audit[5159]: CRED_ACQ pid=5159 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.253695 kernel: audit: type=1103 audit(1746664796.247:1491): pid=5159 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.400679 sshd[5157]: pam_unix(sshd:session): session closed for user core May 8 00:39:56.401000 audit[5157]: USER_END pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.403228 systemd[1]: sshd@21-10.0.0.58:22-10.0.0.1:42394.service: Deactivated successfully. May 8 00:39:56.403995 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:39:56.404506 systemd-logind[1212]: Session 22 logged out. Waiting for processes to exit. May 8 00:39:56.405349 systemd-logind[1212]: Removed session 22. May 8 00:39:56.401000 audit[5157]: CRED_DISP pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.408504 kernel: audit: type=1106 audit(1746664796.401:1492): pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.408589 kernel: audit: type=1104 audit(1746664796.401:1493): pid=5157 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:39:56.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.58:22-10.0.0.1:42394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:39:56.901676 kubelet[1954]: E0508 00:39:56.901616 1954 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:01.411035 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:40:01.411165 kernel: audit: type=1130 audit(1746664801.406:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:42400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:01.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:42400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:01.406446 systemd[1]: Started sshd@22-10.0.0.58:22-10.0.0.1:42400.service. May 8 00:40:01.452000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.453337 sshd[5177]: Accepted publickey for core from 10.0.0.1 port 42400 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:40:01.455161 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:01.454000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.459918 kernel: audit: type=1101 audit(1746664801.452:1496): pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.460000 kernel: audit: type=1103 audit(1746664801.454:1497): pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.460025 kernel: audit: type=1006 audit(1746664801.454:1498): pid=5177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 8 00:40:01.461133 systemd-logind[1212]: New session 23 of user core. May 8 00:40:01.454000 audit[5177]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffca6a610 a2=3 a3=1 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.461985 systemd[1]: Started session-23.scope. May 8 00:40:01.465379 kernel: audit: type=1300 audit(1746664801.454:1498): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffca6a610 a2=3 a3=1 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:01.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:01.466823 kernel: audit: type=1327 audit(1746664801.454:1498): proctitle=737368643A20636F7265205B707269765D May 8 00:40:01.466862 kernel: audit: type=1105 audit(1746664801.465:1499): pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.465000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.467000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.473414 kernel: audit: type=1103 audit(1746664801.467:1500): pid=5179 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.586278 sshd[5177]: pam_unix(sshd:session): session closed for user core May 8 00:40:01.586000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.588973 systemd[1]: sshd@22-10.0.0.58:22-10.0.0.1:42400.service: Deactivated successfully. May 8 00:40:01.589799 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:40:01.590316 systemd-logind[1212]: Session 23 logged out. Waiting for processes to exit. May 8 00:40:01.590983 systemd-logind[1212]: Removed session 23. May 8 00:40:01.586000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.594394 kernel: audit: type=1106 audit(1746664801.586:1501): pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.594435 kernel: audit: type=1104 audit(1746664801.586:1502): pid=5177 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:01.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:42400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:06.590721 systemd[1]: Started sshd@23-10.0.0.58:22-10.0.0.1:45672.service. May 8 00:40:06.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:06.591770 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:40:06.591810 kernel: audit: type=1130 audit(1746664806.590:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:06.632000 audit[5193]: USER_ACCT pid=5193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.633100 sshd[5193]: Accepted publickey for core from 10.0.0.1 port 45672 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:40:06.634362 sshd[5193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:06.633000 audit[5193]: CRED_ACQ pid=5193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.638481 systemd-logind[1212]: New session 24 of user core. May 8 00:40:06.638727 systemd[1]: Started session-24.scope. May 8 00:40:06.639148 kernel: audit: type=1101 audit(1746664806.632:1505): pid=5193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.639198 kernel: audit: type=1103 audit(1746664806.633:1506): pid=5193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.639216 kernel: audit: type=1006 audit(1746664806.633:1507): pid=5193 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 8 00:40:06.633000 audit[5193]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7d41ac0 a2=3 a3=1 items=0 ppid=1 pid=5193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:06.644117 kernel: audit: type=1300 audit(1746664806.633:1507): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7d41ac0 a2=3 a3=1 items=0 ppid=1 pid=5193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:06.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:06.645634 kernel: audit: type=1327 audit(1746664806.633:1507): proctitle=737368643A20636F7265205B707269765D May 8 00:40:06.645730 kernel: audit: type=1105 audit(1746664806.644:1508): pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.644000 audit[5193]: USER_START pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.645000 audit[5195]: CRED_ACQ pid=5195 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.651994 kernel: audit: type=1103 audit(1746664806.645:1509): pid=5195 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.752041 sshd[5193]: pam_unix(sshd:session): session closed for user core May 8 00:40:06.752000 audit[5193]: USER_END pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.754678 systemd[1]: sshd@23-10.0.0.58:22-10.0.0.1:45672.service: Deactivated successfully. May 8 00:40:06.755435 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:40:06.755936 systemd-logind[1212]: Session 24 logged out. Waiting for processes to exit. May 8 00:40:06.752000 audit[5193]: CRED_DISP pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.756659 systemd-logind[1212]: Removed session 24. May 8 00:40:06.759460 kernel: audit: type=1106 audit(1746664806.752:1510): pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.759522 kernel: audit: type=1104 audit(1746664806.752:1511): pid=5193 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:06.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'